INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:833a2400 r4:833a2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fce38c r4:84fce000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fce38c r4:83363680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a2400 r8:833636ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83363680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027f5e8 r7:df83de60 r6:83363700 r5:833a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8335ff40 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6649000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/0:3:1791 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:1791 tgid:1791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0f1d84 r8:00000002 r7:60000013 r6:eb0f1d8c r5:83aac800 r4:83aac800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aac800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aac800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85082f8c r4:85082c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85082f8c r4:842c9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aac800 r8:842c98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:842c9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842c9880 r8:8027f5e8 r7:df83de60 r6:842c9900 r5:83aac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f1fc00 INFO: task kworker/0:3:1791 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6649000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/0:0:3102 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3102 tgid:3102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:84613000 r4:84613000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84613000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84613000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec591000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85081f8c r4:85081c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85081f8c r4:8477f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84613000 r8:8477f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8477f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477f800 r8:8027f5e8 r7:eb0f1e60 r6:8477fa00 r5:84613000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83351d00 INFO: task kworker/0:0:3102 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6964000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/0:1:3115 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:84611800 r4:84611800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84611800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bfc00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84611800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb593000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85083b8c r4:85083800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083b8c r4:8477f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84611800 r8:8477f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8477f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477f900 r8:8027f5e8 r7:eb0f1e60 r6:8477f780 r5:84611800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84777600 INFO: task kworker/0:1:3115 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6964000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:1:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83242400 r4:83242400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd3c00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4478c r4:84d44400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4478c r4:84773500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:8477352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773500 r8:8027f5e8 r7:df959e60 r6:8477fa80 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9840 INFO: task kworker/1:1:3120 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6964000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:5:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:84616000 r4:84616000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84616000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84616000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85338f8c r4:85338c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85338f8c r4:84773e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84616000 r8:84773eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773e80 r8:8027f5e8 r7:df9c1e60 r6:8477fb80 r5:84616000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9a00 INFO: task kworker/1:5:3123 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6bc0000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:6:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:833a5400 r4:833a5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d9a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f24b8c r4:84f24800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f24b8c r4:84773980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a5400 r8:847739ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773980 r8:8027f5e8 r7:df9cde60 r6:8477fc00 r5:833a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9b80 INFO: task kworker/1:6:3125 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6bc0000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:7:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:83863c00 r4:83863c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83863c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83863c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f25f8c r4:84f25c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f25f8c r4:84773a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83863c00 r8:84773aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773a80 r8:8027f5e8 r7:df9cde60 r6:8477fc80 r5:83863c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9cc0 INFO: task kworker/1:7:3127 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e7bdc000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:8:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83865400 r4:83865400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83865400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ad680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83865400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f26b8c r4:84f26800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f26b8c r4:84773b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83865400 r8:84773bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773b80 r8:8027f5e8 r7:df9cde60 r6:8477fd00 r5:83865400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9e40 INFO: task kworker/1:8:3129 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e7bdc000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:9:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:83ab5400 r4:83ab5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4578c r4:84d45400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4578c r4:84773c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab5400 r8:84773c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773c00 r8:8027f5e8 r7:df9cde60 r6:8477fd80 r5:83ab5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9f80 INFO: task kworker/1:9:3131 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e7bdc000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3133 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83ab3c00 r4:83ab3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524c100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee78c r4:850ee400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ee78c r4:84773c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab3c00 r8:84773cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773c80 r8:8027f5e8 r7:df9cde60 r6:8477fe00 r5:83ab3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847361c0 INFO: task kworker/1:10:3133 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e842a000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:83ab2400 r4:83ab2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524c040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0491000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee38c r4:850ee000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ee38c r4:84773d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab2400 r8:84773d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773d00 r8:8027f5e8 r7:df9cde60 r6:8477fe80 r5:83ab2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736100 INFO: task kworker/1:11:3135 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e842a000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83238000 r4:83238000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847363c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83238000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eef8c r4:850eec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850eef8c r4:84773e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238000 r8:84773e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773e00 r8:8027f5e8 r7:df9cde60 r6:8477ff00 r5:83238000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736240 INFO: task kworker/1:12:3137 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e88ee000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83236000 r4:83236000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b2900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eeb8c r4:850ee800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850eeb8c r4:84773d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:84773dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773d80 r8:8027f5e8 r7:df9cde60 r6:8477ff80 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847363c0 INFO: task kworker/1:13:3139 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e88ee000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:83238c00 r4:83238c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535af80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83238c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d46b8c r4:84d46800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d46b8c r4:84773480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238c00 r8:847734ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773480 r8:8027f5e8 r7:df9cde60 r6:8477fb00 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736500 INFO: task kworker/1:14:3141 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8ac2000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa59d84 r8:00000002 r7:60000013 r6:dfa59d8c r5:83883c00 r4:83883c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83883c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ad9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529cb8c r4:8529c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cb8c r4:84773200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83883c00 r8:8477322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773200 r8:8027f5e8 r7:df9cde60 r6:8477f980 r5:83883c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736600 INFO: task kworker/1:15:3143 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8ac2000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:83884800 r4:83884800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83884800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83884800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541d38c r4:8541d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d38c r4:84773180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83884800 r8:847731ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773180 r8:8027f5e8 r7:dfa59e60 r6:8477f100 r5:83884800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736740 INFO: task kworker/1:16:3145 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8dde000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83881800 r4:83881800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83881800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83881800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455b8c r4:85455800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85455b8c r4:8336bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83881800 r8:8336bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8336bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8336bd80 r8:8027f5e8 r7:dfa69e60 r6:84422180 r5:83881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847369c0 INFO: task kworker/1:17:3148 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8dde000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:84615400 r4:84615400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84615400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e34e40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84615400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558538c r4:85585000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558538c r4:84355780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84615400 r8:843557ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84355780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84355780 r8:8027f5e8 r7:dfa69e60 r6:84422200 r5:84615400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736b40 INFO: task kworker/1:18:3150 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9137000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:84020000 r4:84020000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84020000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84020000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e38c r4:8541e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e38c r4:84355700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84020000 r8:8435572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84355700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84355700 r8:8027f5e8 r7:dfa81e60 r6:83ffa900 r5:84020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736bc0 INFO: task kworker/1:19:3151 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9137000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3153 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:84024800 r4:84024800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84024800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ed480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84024800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541fb8c r4:8541f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541fb8c r4:84587200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84024800 r8:8458722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84587200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84587200 r8:8027f5e8 r7:dfa81e60 r6:83ffa880 r5:84024800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736e00 INFO: task kworker/1:20:3153 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9137000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3157 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaadd84 r8:00000002 r7:60000013 r6:dfaadd8c r5:832ee000 r4:832ee000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832ee000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84777000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4778c r4:84d47400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4778c r4:84587380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ee000 r8:845873ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84587380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84587380 r8:8027f5e8 r7:dfa81e60 r6:838e7b00 r5:832ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736f00 INFO: task kworker/1:21:3157 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e98ce000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3159 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:84172400 r4:84172400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84172400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561fac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558678c r4:85586400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558678c r4:84325b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84172400 r8:84325b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84325b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84325b00 r8:8027f5e8 r7:dfa81e60 r6:838a2180 r5:84172400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb1c0 INFO: task kworker/1:22:3159 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e98ce000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:84175400 r4:84175400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84175400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84175400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b8b8c r4:856b8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b8b8c r4:838a2980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84175400 r8:838a29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838a2980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2980 r8:8027f5e8 r7:dfa65e60 r6:838a2100 r5:84175400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb1c0 INFO: task kworker/1:23:3160 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9a71000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:84176000 r4:84176000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84176000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564a940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84176000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85587b8c r4:85587800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85587b8c r4:838a2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84176000 r8:838a292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838a2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2900 r8:8027f5e8 r7:df97de60 r6:830b8700 r5:84176000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e280 INFO: task kworker/1:24:3162 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9fe5000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3164 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:84171800 r4:84171800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84171800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8476e280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84171800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb231000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a538c r4:855a5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a538c r4:830b8600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84171800 r8:830b862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8600 r8:8027f5e8 r7:df97de60 r6:830b8800 r5:84171800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e100 INFO: task kworker/1:25:3164 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9fe5000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3166 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84176c00 r4:84176c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84176c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bff8c r4:857bfc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857bff8c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84176c00 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:dfac1e60 r6:830b8400 r5:84176c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e340 INFO: task kworker/1:26:3166 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:84173c00 r4:84173c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84173c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb659000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a738c r4:855a7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a738c r4:830b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84173c00 r8:830b86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027f5e8 r7:dfab9e60 r6:84c8e000 r5:84173c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e680 INFO: task kworker/1:27:3167 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:84170000 r4:84170000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84170000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508aec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84170000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85768b8c r4:85768800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85768b8c r4:84c8e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84170000 r8:84c8e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e080 r8:8027f5e8 r7:dfab9e60 r6:84c8e100 r5:84170000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e900 INFO: task kworker/1:28:3170 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:84174800 r4:84174800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84174800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84174800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec809000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577eb8c r4:8577e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577eb8c r4:84c8e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84174800 r8:84c8e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e180 r8:8027f5e8 r7:dfae1e60 r6:84c8e200 r5:84174800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e700 INFO: task kworker/1:29:3172 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83302400 r4:83302400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83302400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83302400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e78c r4:8577e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577e78c r4:84c8e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83302400 r8:84c8e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e280 r8:8027f5e8 r7:dfae9e60 r6:84c8e300 r5:83302400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e9c0 INFO: task kworker/1:30:3175 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb09d84 r8:00000002 r7:60000013 r6:dfb09d8c r5:8388a400 r4:8388a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8388a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508238c r4:85082000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508238c r4:838e7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388a400 r8:838e7aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:838e7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e7a80 r8:8027f5e8 r7:eb0f1e60 r6:83898400 r5:8388a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476fa40 INFO: task kworker/0:4:3176 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: eb372000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:8388bc00 r4:8388bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8388bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfafb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577f78c r4:8577f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577f78c r4:84c8e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388bc00 r8:84c8e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e400 r8:8027f5e8 r7:dfae9e60 r6:83898380 r5:8388bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476ec40 INFO: task kworker/1:31:3178 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: eb372000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 INFO: task kworker/1:32:3180 blocked for more than 451 seconds. r10:82918930 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83aa3000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:8594038c r4:85940000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04d9d28 to 0xe04d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:33:3182 blocked for more than 451 seconds. Call trace: r5:83aa3c00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f91c0 r5:84d4bf8c r4:84d4bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4bf8c r4:84c8e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3c00 r8:84c8e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e580 r8:8027f5e8 r7:dfaf5e60 r6:84c8e600 r5:83aa3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476ee80 INFO: task kworker/1:33:3182 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: eb6ec000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84170c00 r4:84170c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84170c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591a7c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f121000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4c38c r4:84d4c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 r4:e04d9dc0 r5:00001000 r4:dfe5d000 r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 Exception stack(0xe04d9fb0 to 0xe04d9ff8) INFO: task kworker/1:35:3187 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r5:83aa8000 r4:8291892c r4:00000000 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8000 r8:84c8e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e780 r8:8027f5e8 r7:dfb25e60 r6:84c8e800 r5:83aa8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ce100 INFO: task kworker/1:35:3187 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ebc5d000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83889800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfb49fb0 to 0xdfb49ff8) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80050013 ffffffff r4:e04d9dc0 r5:00001000 r4:dfe5d000 r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:83888c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83888c00 r8:84c8e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb51d84 r8:00000002 r7:60000013 r6:dfb51d8c r5:8388c800 r4:8388c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c82c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8388c800 r7:00000000 r6:83018200 r5:00001000 r4:7f24b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a9b8c r4:858a9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a9b8c r4:84c8e980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388c800 r8:84c8e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e980 r8:8027f5e8 r7:dfb4de60 r6:832a1080 r5:8388c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ce580 INFO: task kworker/1:38:3192 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ec197000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 Exception stack(0xe04d9fb0 to 0xe04d9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:82918930 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:832ec800 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80050013 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r5:84ea678c r4:84ea6400 r4:84fab000 Exception stack(0xe04d9fb0 to 0xe04d9ff8) INFO: task kworker/1:40:3196 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r5:832e8000 r4:8291892c r4:00000000 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84c8ea80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:84da0000 r4:84da0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84da0000 r7:00000000 r6:83018200 r5:00001000 r4:7f245000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a8f8c r4:858a8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a8f8c r4:84c8eb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da0000 r8:84c8ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8eb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8eb80 r8:8027f5e8 r7:dfb55e60 r6:830cd100 r5:84da0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ceb80 INFO: task kworker/1:41:3200 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ec71e000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:dfb39d84 r8:00000002 r7:60000013 r6:dfb39d8c r5:84da0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r9:83018205 r8:84da0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f243000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec94d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 7f5ea000 eca73000 00000001 80239b98 7f185000 00000001 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb91d84 r8:00000002 r7:60000013 r6:dfb91d8c r5:84da2400 r4:84da2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ce980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84da2400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4d78c r4:85a4d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4d78c r4:84c8ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da2400 r8:84c8ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8ed00 r8:8027f5e8 r7:dfb85e60 r6:830cd380 r5:84da2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846cefc0 INFO: task kworker/1:44:3206 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 7f5ea000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b94c0 r5:00001000 r4:dfb9b000 r7:ddde2d80 r6:83018200 r5:85a4cf8c r4:84c8ed80 r10:00000000 r9:84c8ed80 r8:8027f5e8 r7:dfb91e60 r6:84c8ee00 r5:83aad400 r4:84d14080 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:46 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d14080 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aabc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4d38c r4:85a4d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4d38c r4:84c8ee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aabc00 r8:84c8eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8ee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8ee80 r8:8027f5e8 r7:dfb99e60 r6:84c8ef00 r5:83aabc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14280 INFO: task kworker/1:46:3210 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 7fb8c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:84da3c00 r4:84da3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84da3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859db8c0 r5:00001000 r4:ec65f000 r7:ddde2d80 r6:83018200 r5:85a17b8c r4:84c8ef80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:48 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84da5400 r4:84da5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c80c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84da5400 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac178c r4:85ac1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac178c r4:84c8eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da5400 r8:84c8eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8eb00 r8:8027f5e8 r7:dfbb9e60 r6:847bb080 r5:84da5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14580 INFO: task kworker/1:48:3214 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8007d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84da6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r9:83018005 r8:84da6000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb64d000 r7:dddced80 r6:83018000 r5:8508438c r4:847bb100 Exception stack(0xdfb71fb0 to 0xdfb71ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:dfbc5d84 r8:00000002 r7:60000013 r6:dfbc5d8c r5:84da6c00 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb28f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508338c r4:85083000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508338c r4:847bb200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da6c00 r8:847bb22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847bb200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bb200 r8:8027f5e8 r7:dfb71e60 r6:847bb280 r5:84da6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b9980 INFO: task kworker/0:7:3220 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8007d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:49 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r9:83018205 r8:84da3000 r7:00000000 r6:83018200 r5:00001000 r4:7f375000 r5:00001000 r4:ed089000 r7:ddde2d80 r6:83018200 r5:85a35b8c r4:846cd000 r10:00000000 r9:846cd000 r8:8027f5e8 r7:dfbbde60 r6:847bb300 r5:84da3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84df8000 r4:84df8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84df8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84df8000 r7:00000000 r6:83018200 r5:00001000 r4:7f375000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac2f8c r4:85ac2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac2f8c r4:846cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df8000 r8:846cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd080 r8:8027f5e8 r7:dfbbde60 r6:847bb380 r5:84df8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14600 INFO: task kworker/1:50:3222 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80822000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/1:51:3225 blocked for more than 451 seconds. r4:83aaa400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d149c0 INFO: task kworker/1:51:3225 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80822000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:83aa8c00 r4:83aa8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35680 r5:00001000 r4:ecfe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84d6178c r4:846cd200 r4:846cd200 Exception stack(0xdfbedfb0 to 0xdfbedff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:84ea6b8c r4:84ea6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:53:3230 blocked for more than 451 seconds. r4:83aae000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f6eb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed007000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d6138c r4:84d61000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d6138c r4:846cd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aae000 r8:846cd32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd300 r8:8027f5e8 r7:dfbede60 r6:846cd380 r5:83aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14c00 INFO: task kworker/1:53:3230 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80c57000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84df8c00 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecf79000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f6e7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d61b8c r4:84d61800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d61b8c r4:846cd480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfa400 r8:846cd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd480 r8:8027f5e8 r7:dfc11e60 r6:847bb480 r5:84dfa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ce9c0 INFO: task kworker/1:55:3233 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80c57000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r9:83018205 r8:84dfbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f6df000 r5:00001000 r4:ece5d000 r7:ddde2d80 r6:83018200 r5:84d5cb8c r4:846cd500 Exception stack(0xdfc2dfb0 to 0xdfc2dff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84df9800 r7:00000000 r6:83018200 r5:00001000 r4:7f6e3000 r5:00001000 r4:ecf29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5c38c r4:84d5c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5c38c r4:846cd580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df9800 r8:846cd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd580 r8:8027f5e8 r7:dfc2de60 r6:847bb580 r5:84df9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84777640 INFO: task kworker/1:57:3236 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8174b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3238 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84dfb000 r4:84dfb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dfb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35240 r5:00001000 r4:ece97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8174b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecd51000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84dfe000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r9:83018205 r8:84dfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f6dd000 r5:00001000 r4:ece1f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:846cd700 r8:8027f5e8 r7:dfc4de60 r6:847bb700 r5:84dfe000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b8300 INFO: task kworker/1:60:3242 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8174b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3245 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:84e08000 r4:84e08000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e08000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571e940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e08000 r7:00000000 r6:83018200 r5:00001000 r4:7f6db000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5d38c r4:84d5d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5d38c r4:846cd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e08000 r8:846cd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfc69fb0 to 0xdfc69ff8) r4:847b8400 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84e09800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r9:83018205 r8:84e09800 r7:00000000 r6:83018200 r5:00001000 r4:7f6d7000 r5:00001000 r4:ecc7d000 r7:ddde2d80 r6:83018200 r5:84d5df8c r4:846cd800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e09800 r8:846cd82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd800 r8:8027f5e8 r7:dfc4de60 r6:847bb800 r5:84e09800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b88c0 INFO: task kworker/1:62:3247 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 81c81000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84e08c00 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84e08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d5000 r5:00001000 r4:ecb91000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846cd880 r8:8027f5e8 r7:dfc4de60 r6:847bb880 r5:84e08c00 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:64 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:65:3253 blocked for more than 451 seconds. Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc99d84 r8:00000002 r7:60000113 r6:dfc99d8c r5:84e0bc00 r4:84e0bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8b880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f589000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5f78c r4:84d5f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5f78c r4:846cd980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e0bc00 r8:846cd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd980 r8:8027f5e8 r7:dfc91e60 r6:847bb980 r5:84e0bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc99fb0 to 0xdfc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b8ac0 INFO: task kworker/1:65:3253 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 824b2000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3255 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84e0d400 r4:84e0d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23e00 r5:00001000 r4:ed5e3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecacd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d5e78c r4:846cda80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3258 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcb5d84 r8:00000002 r7:60000013 r6:dfcb5d8c r5:84e0c800 r4:84e0c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bfd00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85083f8c r4:85083c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083f8c r4:847bbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e0c800 r8:847bbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847bbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bbb00 r8:8027f5e8 r7:dfb71e60 r6:847bbb80 r5:84e0c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847bec80 INFO: task kworker/0:8:3258 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 83046000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84dfc800 r4:84dfc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dfc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23f00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f60d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5eb8c r4:84d5e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5eb8c r4:846cdb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfc800 r8:846cdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdb00 r8:8027f5e8 r7:dfca9e60 r6:847bbc00 r5:84dfc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b8d00 INFO: task kworker/1:68:3260 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 task:kworker/1:69 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed5d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d5d78c r4:846cdb80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3265 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfce1d84 r8:00000002 r7:60000113 r6:dfce1d8c r5:84e0a400 r4:84e0a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23c00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5f38c r4:84d5f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5f38c r4:846cdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e0a400 r8:846cdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdc00 r8:8027f5e8 r7:dfcc5e60 r6:847bbd00 r5:84e0a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 83695000 eca73000 00000001 80239b98 7f185000 00000001 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 task:kworker/1:71 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:84e00000 r4:84e00000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e00000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d24c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e00000 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bf4b8c r4:85bf4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bf4b8c r4:846cdc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e00000 r8:846cdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdc80 r8:8027f5e8 r7:dfcc5e60 r6:847bbd80 r5:84e00000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b9400 INFO: task kworker/1:71:3266 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3268 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84e01800 r4:84e01800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e01800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ee40 r5:00001000 r4:ecb17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1e38c r4:85b1e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1e38c r4:846cdd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e01800 r8:846cdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdd00 r8:8027f5e8 r7:dfcc5e60 r6:847bbe00 r5:84e01800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc0280 INFO: task kworker/1:72:3268 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 83b64000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84e00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f603000 r5:00001000 r4:dfced000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84e00c00 r8:846cddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc0100 INFO: task kworker/1:73:3270 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 83b64000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:84e03c00 r5:00001000 r4:ed997000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846cde00 r8:8027f5e8 r7:dfcc5e60 r6:847bbf00 r5:84e03c00 Exception stack(0xe04e9d28 to 0xe04e9d70) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3274 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84183000 r4:84183000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84183000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba5c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84183000 r7:00000000 r6:83018200 r5:00001000 r4:7f603000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aeb78c r4:85aeb400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aeb78c r4:846cde80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84183000 r8:846cdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cde80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bb0 r5:00001000 r4:dfe9b000 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c45f8c r4:85c45c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c45f8c r4:846cdf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84186c00 r8:846cdfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed8cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85cd278c r4:84dce080 Exception stack(0xdfa09fb0 to 0xdfa09ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84180000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fc040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84180000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084f8c r4:85084c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85084f8c r4:847bbf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84180000 r8:847bbfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847bbf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bbf80 r8:8027f5e8 r7:dfb71e60 r6:84dce200 r5:84180000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc8880 INFO: task kworker/0:9:3283 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 84362000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3284 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:84181800 r4:84181800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84181800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85706200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84181800 r7:00000000 r6:83018200 r5:00001000 r4:7f709000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed743000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cd238c r4:85cd2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd238c r4:84dce180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84181800 r8:84dce1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dce180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dce180 r8:8027f5e8 r7:dfa09e60 r6:84dce280 r5:84181800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 84774000 eca73000 00000001 80239b98 7f185000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3285 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3285 tgid:3285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa49d84 r8:00000002 r7:60000013 r6:dfa49d8c r5:84183c00 r4:84183c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84183c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bff00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84183c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb835000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508478c r4:85084400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508478c r4:84dcf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84183c00 r8:84dcf02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d20: 84774000 eca73000 00000001 80239b98 7f185000 00000001 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3287 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:84180c00 r4:84180c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84180c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aac00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84180c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb879000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084b8c r4:85084800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85084b8c r4:84dcf080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84180c00 r8:84dcf0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf080 r8:8027f5e8 r7:dfa2de60 r6:84dce380 r5:84180c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc8a40 INFO: task kworker/0:11:3287 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 84774000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:79:3289 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84dfec00 r4:84dfec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dfec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eccd00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f7c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cd338c r4:85cd3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd338c r4:84dce400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfec00 r8:84dce42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dce400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dce400 r8:8027f5e8 r7:dfa09e60 r6:84dce480 r5:84dfec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847bec40 INFO: task kworker/1:79:3289 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8503b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3295 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:846a0c00 r4:846a0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846a0c00 r4:8291892c r4:00000000 r9:83018005 r8:846a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r5:00001000 r4:eb8db000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba43000 r7:dddced80 r6:83018000 r5:85085f8c r4:84dcf180 r4:84dc8e00 Exception stack(0xe04e9d28 to 0xe04e9d70) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:84e03000 r4:8291892c r4:00000000 r5:00001000 r4:eba1f000 r5:85085b8c r4:85085800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9d28 to 0xe04e9d70) r5:00001000 r4:dfe9b000 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3301 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd2dd84 r8:00000002 r7:60000113 r6:dfd2dd8c r5:84e06000 r4:84e06000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e06000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd2de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fc5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e06000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508638c r4:85086000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508638c r4:84dcf300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e06000 r8:84dcf32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf300 r8:8027f5e8 r7:dfaa1e60 r6:84dcf380 r5:84e06000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd2dfb0 to 0xdfd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4300 INFO: task kworker/0:15:3301 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r5:00001000 r4:eba91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086b8c r4:85086800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85086b8c r4:84dcf400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e06c00 r8:84dcf42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf400 r8:8027f5e8 r7:dfd2de60 r6:84dcf480 r5:84e06c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4180 INFO: task kworker/0:16:3303 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 859e6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba7b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508678c r4:85086400 r10:61c88647 r9:84e05400 r8:84dcf52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd4500 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84e04800 r4:8291892c r4:00000000 r5:00001000 r4:ebabd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086f8c r4:85086c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85086f8c r4:84dcf600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e04800 r8:84dcf62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf600 r8:8027f5e8 r7:dfd29e60 r6:84dcf680 r5:84e04800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd45c0 INFO: task kworker/0:18:3306 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 859e6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84faa100 Workqueue: events bpf_prog_free_deferred r4:84e02400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 INFO: task kworker/0:20:3311 blocked for more than 451 seconds. r10:82918930 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:846e8000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebc1f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85087b8c r4:84dcf800 Exception stack(0xdfd3dfb0 to 0xdfd3dff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 85e4d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:846e9800 r4:846e9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846e9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fca80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508778c r4:85087400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508778c r4:84dcf980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e9800 r8:84dcf9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf980 r8:8027f5e8 r7:dfd3de60 r6:84dcfa00 r5:846e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4ac0 INFO: task kworker/0:21:3314 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86319000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3315 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3315 tgid:3315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd45d84 r8:00000002 r7:60000113 r6:dfd45d8c r5:846ea400 r4:846ea400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846ea400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fccc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85087f8c r4:85087c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85087f8c r4:84dcfa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846ea400 r8:84dcfaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcfa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcfa80 r8:8027f5e8 r7:dfd3de60 r6:84dcfb00 r5:846ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd45fb0 to 0xdfd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4c00 INFO: task kworker/0:22:3315 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86319000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3318 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3318 tgid:3318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:846eb000 r4:846eb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846eb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fcd80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583838c r4:85838000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583838c r4:84dcfb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846eb000 r8:84dcfbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcfb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcfb80 r8:8027f5e8 r7:dfd45e60 r6:84dcfc00 r5:846eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4ec0 INFO: task kworker/0:23:3318 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8669f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3620 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3620 tgid:3620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:84e68c00 r4:84e68c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e68c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0601000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501838c r4:85018000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501838c r4:84d2a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e68c00 r8:84d2a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d2a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2a800 r8:8027f5e8 r7:e0095e60 r6:847e8080 r5:84e68c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00bdfb0 to 0xe00bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eb6540 INFO: task kworker/1:111:3620 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8669f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3688 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0165d84 r8:00000002 r7:60000113 r6:e0165d8c r5:84f64800 r4:84f64800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f64800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0165e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd3c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f64800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2438c r4:84f24000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f2438c r4:84ee2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f64800 r8:84ee21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ee2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee2180 r8:8027f5e8 r7:e00bde60 r6:84ee2200 r5:84f64800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0165fb0 to 0xe0165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ecab40 INFO: task kworker/1:116:3688 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86a08000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:3719 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e00f9d84 r8:00000002 r7:60000013 r6:e00f9d8c r5:84f70000 r4:84f70000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f70000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faab40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea7b8c r4:84ea7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea7b8c r4:84fab200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70000 r8:84fab22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab200 r8:8027f5e8 r7:e04d9e60 r6:84fab280 r5:84f70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f9fb0 to 0xe00f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 INFO: task kworker/0:186:3719 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86d4c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:3724 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04e5d84 r8:00000002 r7:60000113 r6:e04e5d8c r5:84f71800 r4:84f71800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f71800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 INFO: task kworker/0:188:3724 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86d4c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3725 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04f1d84 r8:00000002 r7:60000113 r6:e04f1d8c r5:84f72400 r4:84f72400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f72400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 INFO: task kworker/0:189:3725 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8717b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3727 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3727 tgid:3727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:84f73000 r4:84f73000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f73000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f73000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea778c r4:84ea7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea778c r4:84fab600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f73000 r8:84fab62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab600 r8:8027f5e8 r7:e00f9e60 r6:84fab680 r5:84f73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faab00 INFO: task kworker/0:190:3727 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8717b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:3730 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84f73c00 r4:84f73c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f73c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faac00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0047000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea7f8c r4:84ea7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea7f8c r4:84fab700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f73c00 r8:84fab72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab700 r8:8027f5e8 r7:e00f9e60 r6:84fab780 r5:84f73c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa980 INFO: task kworker/0:191:3730 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 874d5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:3731 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:3731 tgid:3731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04fdd84 r8:00000002 r7:60000113 r6:e04fdd8c r5:84f74800 r4:84f74800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f74800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faae40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f74800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eac38c r4:84eac000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eac38c r4:84fab800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f74800 r8:84fab82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab800 r8:8027f5e8 r7:e04f9e60 r6:84fab880 r5:84f74800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04fdfb0 to 0xe04fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faac40 INFO: task kworker/0:192:3731 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 874d5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3734 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0501d84 r8:00000002 r7:60000013 r6:e0501d8c r5:84f75400 r4:84f75400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f75400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f75400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ead38c r4:84ead000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ead38c r4:84fab900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f75400 r8:84fab92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab900 r8:8027f5e8 r7:e04fde60 r6:84fab980 r5:84f75400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0501fb0 to 0xe0501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faae00 INFO: task kworker/0:193:3734 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 87967000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3736 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:3736 tgid:3736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0509d84 r8:00000002 r7:60000113 r6:e0509d8c r5:84f76000 r4:84f76000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f76000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0509e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faaf00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f76000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eac78c r4:84eac400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eac78c r4:84faba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f76000 r8:84faba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84faba00 r8:8027f5e8 r7:e0501e60 r6:84faba80 r5:84f76000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0509fb0 to 0xe0509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fb9100 INFO: task kworker/0:194:3736 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 87967000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:3737 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04edd84 r8:00000002 r7:60000113 r6:e04edd8c r5:84f76c00 r4:84f76c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f76c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eacb8c r4:84eac800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eacb8c r4:84fabb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f76c00 r8:84fabb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fabb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabb00 r8:8027f5e8 r7:e0501e60 r6:84fabb80 r5:84f76c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04edfb0 to 0xe04edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0517000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eacf8c r4:84eacc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eacf8c r4:84fabc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846c0000 r8:84fabc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fabc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabc00 r8:8027f5e8 r7:e0501e60 r6:84fabc80 r5:846c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0515fb0 to 0xe0515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fb91c0 INFO: task kworker/0:196:3738 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 88317000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:3741 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0511d84 r8:00000002 r7:60000113 r6:e0511d8c r5:846c0c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0531000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e052b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84fb9500 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:3744 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:3744 tgid:3744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0521d84 r8:00000002 r7:60000113 r6:e0521d8c r5:846c2400 r4:846c2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846c2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0545000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eae38c r4:84eae000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eae38c r4:84fabf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846c2400 r8:84fabf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fabf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabf00 r8:8027f5e8 r7:e0511e60 r6:84fabf80 r5:846c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0521fb0 to 0xe0521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fb9500 INFO: task kworker/0:199:3744 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:e04e9dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e0551d84 r8:00000002 r7:60000013 r6:e0551d8c r5:84fdd400 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e053f000 r5:84eadf8c r4:84eadc00 r4:84fc9000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:201:3749 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:3749 tgid:3749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0561d84 r8:00000002 r7:60000013 r6:e0561d8c r5:84f66c00 r4:84f66c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f66c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eaeb8c r4:84eae800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eaeb8c r4:84fc9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f66c00 r8:84fc90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9080 r8:8027f5e8 r7:e0521e60 r6:84ee2800 r5:84f66c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fb9c40 INFO: task kworker/0:201:3749 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 885e8000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa100 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0565e08 r5:00001000 r4:e0557000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:3752 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0589d84 r8:00000002 r7:60000113 r6:e0589d8c r5:84fdec00 r4:84fdec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fdec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e062d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84fdec00 r8:84fc91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9dc0 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 88beb000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:3754 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e058f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r10:82918930 r9:e05a5d84 r8:00000002 r7:60000113 r6:e05a5d8c r5:84fe0000 r9:83018005 r8:84fe0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r10:82918930 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:84fe1800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fe1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eaf78c r4:84eaf400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eaf78c r4:84fc9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fe1800 r8:84fc932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9300 r8:8027f5e8 r7:e0589e60 r6:84ee2a80 r5:84fe1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84f2ca00 INFO: task kworker/0:206:3758 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r5:00001000 r4:dfe9b000 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:e05b5000 r5:84eafb8c r4:84eaf800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:3762 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e05e9d84 r8:00000002 r7:60000013 r6:e05e9d8c r5:84fe3000 r4:84fe3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fe3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fe3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eaff8c r4:84eafc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eaff8c r4:84fc9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fe3000 r8:84fc942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9400 r8:8027f5e8 r7:e0589e60 r6:84ee2b80 r5:84fe3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504c280 INFO: task kworker/0:208:3762 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e061f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501878c r4:84fc9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846c3000 r8:84fc94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9480 r8:8027f5e8 r7:e0589e60 r6:84fc9500 r5:846c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0535fb0 to 0xe0535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504c100 INFO: task kworker/0:209:3764 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 89ef6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c5400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:846c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffbb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501bf8c r4:8501bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501bf8c r4:84ee2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846c5400 r8:84ee2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ee2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee2c00 r8:8027f5e8 r7:e00bde60 r6:84ee2c80 r5:846c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0619fb0 to 0xe0619ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84fab300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:00001000 r4:dfc8b000 r7:ddde2d80 r6:83018200 r5:84f24f8c r4:84ee2d00 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:210:3771 blocked for more than 452 seconds. r4:00000000 r5:00001000 r4:e063b000 r7:dddced80 r6:83018000 r5:85018f8c r4:84fc9580 Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504c780 INFO: task kworker/0:210:3771 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8a785000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:211:3774 blocked for more than 452 seconds. r4:84fe6c00 r4:00000000 r9:83018005 r8:84fe6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r5:00001000 r4:df885000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d20: 8acca000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:212 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84fe4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504cbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fe4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df951000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501978c r4:85019400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501978c r4:84fc9680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fe4800 r8:84fc96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9680 r8:8027f5e8 r7:e0139e60 r6:84ee2f00 r5:84fe4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504c780 INFO: task kworker/0:212:3775 is blocked on a mutex likely owned by task kworker/0:187:3720. Workqueue: events bpf_prog_free_deferred 9d20: 8acca000 eca73000 00000001 80239b98 7f185000 00000001 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfbe1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:3779 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0655d84 r8:00000002 r7:60000013 r6:e0655d8c r5:84fe8000 r4:84fe8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fe8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd3200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fe8000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb73000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2478c r4:84f24400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f2478c r4:84fc9780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fe8000 r8:84fc97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9780 r8:8027f5e8 r7:e0651e60 r6:85058000 r5:84fe8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0655fb0 to 0xe0655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504cc80 INFO: task kworker/0:214:3779 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8b27f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r4:00000000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 9fa0: 00000000 00000000 00000000 00000000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:e00fd000 r7:dddced80 r6:83018000 r5:8501d78c r4:84fc9800 Exception stack(0xe064dfb0 to 0xe064dff8) Workqueue: events bpf_prog_free_deferred 9d20: 8b715000 eca73000 00000001 80239b98 7f185000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3784 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e065dd84 r8:00000002 r7:60000113 r6:e065dd8c r5:84fea400 r4:84fea400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fea400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504cec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fea400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85019f8c r4:85019c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85019f8c r4:84fc9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fea400 r8:84fc98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9880 r8:8027f5e8 r7:e064de60 r6:85058100 r5:84fea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe065dfb0 to 0xe065dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504cb80 INFO: task kworker/0:216:3784 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8b715000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc41000 r7:dddced80 r6:83018000 r5:8501a38c r4:84fc9900 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3788 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e066dd84 r8:00000002 r7:60000013 r6:e066dd8c r5:84feb000 r4:84feb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84feb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd3b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84feb000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a78c r4:8501a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501a78c r4:84fc9980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84feb000 r8:84fc99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9980 r8:8027f5e8 r7:e064de60 r6:85058200 r5:84feb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe066dfb0 to 0xe066dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fd39c0 INFO: task kworker/0:218:3788 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8bc96000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/0:219 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0675e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e040 r5:00001000 r4:dfcbb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501ab8c r4:84fc9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fe9800 r8:84fc9a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9a00 r8:8027f5e8 r7:e064de60 r6:85058280 r5:84fe9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0675fb0 to 0xe0675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504c2c0 INFO: task kworker/0:219:3790 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8c21e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:3793 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:84fed400 r4:84fed400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fed400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fed400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501af8c r4:8501ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501af8c r4:84fc9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fed400 r8:84fc9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9a80 r8:8027f5e8 r7:e064de60 r6:85058300 r5:84fed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505e100 INFO: task kworker/0:220:3793 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8c3c4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:3796 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84fec800 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfd25000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8501b38c r4:84fc9b00 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 9d20: 8c3c4000 eca73000 00000001 80239b98 7f185000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:00000000 r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3797 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e068dd84 r8:00000002 r7:60000013 r6:e068dd8c r5:84fee000 r4:84fee000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fee000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fee000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501b78c r4:8501b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501b78c r4:84fc9b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fee000 r8:84fc9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9b80 r8:8027f5e8 r7:e064de60 r6:85058400 r5:84fee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505e280 INFO: task kworker/0:222:3797 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8c8b6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84ff0c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ff0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501bb8c r4:8501b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501bb8c r4:84fc9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff0c00 r8:84fc9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9c00 r8:8027f5e8 r7:e064de60 r6:85058480 r5:84ff0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0695fb0 to 0xe0695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505e400 INFO: task kworker/0:223:3799 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8c8b6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84ff0000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e000b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84ff0000 r8:84fc9cac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8cb5b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:119:3803 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:119 state:D stack:0 pid:3803 tgid:3803 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dffdb000 r7:ddde2d80 r6:83018200 r5:84f2538c r4:85058580 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84ff3000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505bf80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ff3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2578c r4:84f25400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f2578c r4:85058680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff3000 r8:850586ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85058680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058680 r8:8027f5e8 r7:e0699e60 r6:85058700 r5:84ff3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505bf40 INFO: task kworker/1:120:3804 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8d65e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 r5:84ea6b8c r4:84ea6800 9fa0: 00000000 00000000 00000000 00000000 r4:84ff3c00 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501c78c r4:8501c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501c78c r4:85058780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff3c00 r8:850587ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85058780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058780 r8:8027f5e8 r7:e0615e60 r6:85058800 r5:84ff3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe053dfb0 to 0xe053dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505bec0 INFO: task kworker/1:121:3807 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8d721000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r4:84fab300 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:e0125000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Workqueue: events bpf_prog_free_deferred 9d20: 8dbe0000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:3813 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:3813 tgid:3813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06c1d84 r8:00000002 r7:60000113 r6:e06c1d8c r5:84ff1800 r4:84ff1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ff1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ed40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ff1800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501cf8c r4:84fc9d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff1800 r8:84fc9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc9d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc9d80 r8:8027f5e8 r7:e064de60 r6:85058a00 r5:84ff1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c1fb0 to 0xe06c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505ec40 INFO: task kworker/0:226:3813 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8ddbf000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e00ef000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3817 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:84ff6000 r4:84ff6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ff6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ff6000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0143000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501e38c r4:8501e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501e38c r4:84fc9e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff6000 r8:84fc9eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r5:00001000 r4:e0117000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84c90000 r8:84fc9f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505ea00 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:123:3822 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:123 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06cdd84 r8:00000002 r7:60000113 r6:e06cdd8c r5:84c90c00 r4:84c90c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c90c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ad3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:00001000 r4:e0667000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84f2778c r4:84f27400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c91800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e013b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8501df8c r4:84fc9f80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8f0b9000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:124:3824 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:84c92400 r4:84c92400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c92400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e052d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:231 state:D stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065140 r5:00001000 r4:e014f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8501e78c r4:85067000 r4:85067000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8fba1000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c95400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r9:83018005 r8:84c95400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r5:00001000 r4:e0713000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501fb8c r4:8501f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501fb8c r4:85067080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c95400 r8:850670ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067080 r8:8027f5e8 r7:e06e1e60 r6:85058f00 r5:84c95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065280 INFO: task kworker/0:232:3829 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8fba1000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0159000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501eb8c r4:8501e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501eb8c r4:85067100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c93c00 r8:8506712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067100 r8:8027f5e8 r7:e06ede60 r6:85058f80 r5:84c93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065280 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8fd56000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Call trace: r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501ef8c r4:8501ec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:84fab300 INFO: task kworker/0:235:3834 blocked for more than 453 seconds. [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e06af000 r10:61c88647 r9:84c96000 r8:8506722c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065400 INFO: task kworker/0:235:3834 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8fd56000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0701000 r7:dddced80 r6:83018000 r5:8501f78c r4:85067280 1fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 90450000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r4:00000000 r9:83018005 r8:846c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0711fb0 to 0xe0711ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 90450000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r5:84ea6b8c r4:84ea6800 Exception stack(0xe04e9fb0 to 0xe04e9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502038c r4:85020000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502038c r4:85067480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846c6000 r8:850674ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067480 r8:8027f5e8 r7:e0711e60 r6:85067500 r5:846c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065980 INFO: task kworker/0:238:3841 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 90dc9000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3843 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:846c6c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa27000 r4:85067580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065a40 INFO: task kworker/0:239:3843 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80070013 ffffffff [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfb35000 r7:dddced80 r6:83018000 r5:8502138c r4:85067680 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: 90dc9000 eca73000 00000001 80239b98 7f185000 00000001 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3847 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:84fde000 r4:84fde000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fde000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa99000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85065dc0 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dfad7000 r7:dddced80 r6:83018000 r5:85020f8c r4:85067880 r4:8507f000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 917c0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85021b8c r4:85021800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85021b8c r4:85067980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c80c00 r8:850679ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067980 r8:8027f5e8 r7:e0489e60 r6:85067a00 r5:84c80c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:84ea6b8c r4:84ea6800 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfd81000 r7:dddced80 r6:83018000 r5:8502178c r4:85067a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c81800 r8:85067aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067a80 r8:8027f5e8 r7:e04b9e60 r6:85067b00 r5:84c81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe050dfb0 to 0xe050dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507f180 INFO: task kworker/0:244:3853 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:dfddd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85067b80 r8:8027f5e8 r7:e04b9e60 r6:85067c00 r5:84c82400 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:84fab300 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:246:3858 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0539d84 r8:00000002 r7:60000113 r6:e0539d8c r5:84c83000 r4:84c83000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c83000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507f780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c83000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfead000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502278c r4:85067c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c83000 r8:85067cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067c80 r8:8027f5e8 r7:e0525e60 r6:85067d00 r5:84c83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507f4c0 INFO: task kworker/0:246:3858 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 922e8000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84c83c00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfe85000 r7:dddced80 r6:83018000 r5:8502238c r4:85067d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c83c00 r8:85067dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85067d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85067d80 r8:8027f5e8 r7:e0539e60 r6:85067e00 r5:84c83c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507f680 INFO: task kworker/0:247:3859 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: 92590000 eca73000 00000001 80239b98 7f185000 00000001 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08 r5:00001000 r4:dfeed000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r5:00001000 r4:dfe9b000 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:3863 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0569d84 r8:00000002 r7:60000013 r6:e0569d8c r5:84c85400 r4:84c85400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c85400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff0b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8507f8c0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/0:250:3866 blocked for more than 453 seconds. r4:84c86000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507fe00 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502378c r4:85023400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502378c r4:8508c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c86000 r8:8508c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c080 r8:8027f5e8 r7:e0569e60 r6:8508c100 r5:84c86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe059dfb0 to 0xe059dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507fa40 INFO: task kworker/0:250:3866 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r5:80070013 r4:80239bb0 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:251:3867 blocked for more than 453 seconds. [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:8502338c r4:85023000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0609fb0 to 0xe0609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507fbc0 INFO: task kworker/0:251:3867 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 93439000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:3870 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e071dd84 r8:00000002 r7:60000013 r6:e071dd8c r5:84d08000 r4:84d08000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d08000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85094700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0505000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe071dfb0 to 0xe071dff8) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 task:kworker/0:253 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e048f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85023b8c r4:85023800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85023b8c r4:8508c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d08c00 r8:8508c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c380 r8:8027f5e8 r7:e071de60 r6:8508c400 r5:84d08c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094000 INFO: task kworker/0:253:3871 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 937cf000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:254:3873 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:e0725d84 r8:00000002 r7:60000013 r6:e0725d8c r5:84d09800 r5:84d09800 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e049d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d09800 r8:8508c4ac r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094300 INFO: task kworker/0:254:3873 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 937cf000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:3876 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e072dd84 r8:00000002 r7:60000013 r6:e072dd8c r5:84d0bc00 r4:84d0bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e072de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850941c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502838c r4:85028000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502838c r4:8508c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0bc00 r8:8508c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c580 r8:8027f5e8 r7:e071de60 r6:8508c600 r5:84d0bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe072dfb0 to 0xe072dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094180 INFO: task kworker/0:255:3876 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 93cdb000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:256:3878 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred r4:84d0b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85094500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502878c r4:85028400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502878c r4:8508c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0b000 r8:8508c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c680 r8:8027f5e8 r7:e071de60 r6:8508c700 r5:84d0b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0731fb0 to 0xe0731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094340 INFO: task kworker/0:256:3878 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 93cdb000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:3879 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:84d0d400 r4:84d0d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85094bc0 r5:00001000 r4:e0559000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8502938c r4:85029000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502938c r4:8508c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0d400 r8:8508c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c780 r8:8027f5e8 r7:e071de60 r6:8508c800 r5:84d0d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0735fb0 to 0xe0735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094640 INFO: task kworker/0:257:3879 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 93fcb000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:3882 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:84d0e000 r4:84d0e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85094b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0543000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85028f8c r4:85028c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85028f8c r4:8508c880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0e000 r8:8508c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c880 r8:8027f5e8 r7:e0735e60 r6:8508c900 r5:84d0e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe073dfb0 to 0xe073dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094940 INFO: task kworker/0:258:3882 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 941a0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:125:3884 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:125 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:84ffb000 r4:84ffb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ffb000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0591000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2678c r4:84f26400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f2678c r4:85072100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffb000 r8:8507212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85072100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85072100 r8:8027f5e8 r7:e06cde60 r6:85072180 r5:84ffb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508f5c0 INFO: task kworker/1:125:3884 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9434e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0729d84 r8:00000002 r7:60000013 r6:e0729d8c r5:84ffbc00 r4:84ffbc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffbc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85094cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502978c r4:85029400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502978c r4:8508c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffbc00 r8:8508c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c980 r8:8027f5e8 r7:e0735e60 r6:85072200 r5:84ffbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094c00 INFO: task kworker/0:259:3886 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 94752000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:3888 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:3888 tgid:3888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0745d84 r8:00000002 r7:60000013 r6:e0745d8c r5:84d0ec00 r4:84d0ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502a38c r4:8502a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502a38c r4:8508ca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0ec00 r8:8508ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508ca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ca00 r8:8027f5e8 r7:e0729e60 r6:8508ca80 r5:84d0ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85094d00 INFO: task kworker/0:260:3888 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 94af5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3890 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:84ff9800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:84ff9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:e05fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502af8c r4:8502ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502af8c r4:85072280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff9800 r8:850722ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85072280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85072280 r8:8027f5e8 r7:e06cde60 r6:85072300 r5:84ff9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508f7c0 INFO: task kworker/1:126:3890 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 94af5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:3892 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:3892 tgid:3892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0749d84 r8:00000002 r7:60000013 r6:e0749d8c r5:84f88c00 r4:84f88c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f88c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85094fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029b8c r4:85029800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85029b8c r4:8508cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f88c00 r8:8508cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cb00 r8:8027f5e8 r7:e0745e60 r6:8508cb80 r5:84f88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0749fb0 to 0xe0749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506c140 INFO: task kworker/0:261:3892 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 94af5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:3894 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e074dd84 r8:00000002 r7:60000013 r6:e074dd8c r5:84f89800 r4:84f89800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f89800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f89800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029f8c r4:85029c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85029f8c r4:8508cc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f89800 r8:8508cc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508cc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cc00 r8:8027f5e8 r7:e0745e60 r6:8508cc80 r5:84f89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850930c0 INFO: task kworker/0:262:3894 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95131000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:3896 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84f8a400 r4:84f8a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502ab8c r4:8502a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502ab8c r4:8508cd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8a400 r8:8508cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508cd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cd00 r8:8027f5e8 r7:e0745e60 r6:8508cd80 r5:84f8a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850930c0 INFO: task kworker/0:263:3896 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9532e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:3898 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:3898 tgid:3898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e075dd84 r8:00000002 r7:60000013 r6:e075dd8c r5:84f8b000 r4:84f8b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502a78c r4:8502a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502a78c r4:8508ce00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8b000 r8:8508ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508ce00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ce00 r8:8027f5e8 r7:e0751e60 r6:8508ce80 r5:84f8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe075dfb0 to 0xe075dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093200 INFO: task kworker/0:264:3898 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95741000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:3900 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0765d84 r8:00000002 r7:60000113 r6:e0765d8c r5:84f8c800 r4:84f8c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502b38c r4:8502b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f8c800 r8:8508cf2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0765fb0 to 0xe0765ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:265:3900 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95741000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:127:3902 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:127 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:84ffc800 r4:84ffc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ada00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ffc800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0025000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f26f8c r4:84f26c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f26f8c r4:85072380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffc800 r8:850723ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85072380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85072380 r8:8027f5e8 r7:e06cde60 r6:85072400 r5:84ffc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508fb00 INFO: task kworker/1:127:3902 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95741000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:3904 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:84ffe000 r4:84ffe000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffe000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0755000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bf8c r4:8502bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502bf8c r4:8509a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffe000 r8:8509a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a080 r8:8027f5e8 r7:e0765e60 r6:85072500 r5:84ffe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093700 INFO: task kworker/0:266:3904 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95c72000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:3905 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:3905 tgid:3905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0771d84 r8:00000002 r7:60000113 r6:e0771d8c r5:84ffec00 r4:84ffec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502b78c r4:8502b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502b78c r4:8509a100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffec00 r8:8509a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a100 r8:8027f5e8 r7:e076de60 r6:85072580 r5:84ffec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093700 INFO: task kworker/0:267:3905 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95c72000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:3907 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e077dd84 r8:00000002 r7:60000113 r6:e077dd8c r5:84ffa400 r4:84ffa400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffa400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bb8c r4:8502b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502bb8c r4:8509a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffa400 r8:8509a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a180 r8:8027f5e8 r7:e076de60 r6:85072600 r5:84ffa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe077dfb0 to 0xe077dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093c40 INFO: task kworker/0:268:3907 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95f28000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:3909 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0769d84 r8:00000002 r7:60000013 r6:e0769d8c r5:84f8d400 r4:84f8d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0787000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503438c r4:85034000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503438c r4:8509a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8d400 r8:8509a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a200 r8:8027f5e8 r7:e076de60 r6:8509a280 r5:84f8d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0769fb0 to 0xe0769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093b80 INFO: task kworker/0:269:3909 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 95f28000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:3912 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0781d84 r8:00000002 r7:60000113 r6:e0781d8c r5:84f8e000 r4:84f8e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85034b8c r4:85034800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85034b8c r4:8509a300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8e000 r8:8509a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a300 r8:8027f5e8 r7:e0769e60 r6:8509a380 r5:84f8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093fc0 INFO: task kworker/0:270:3912 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9628a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:3913 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:84f8ec00 r4:84f8ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0795000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503478c r4:85034400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503478c r4:8509a400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8ec00 r8:8509a42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a400 r8:8027f5e8 r7:e0781e60 r6:8509a480 r5:84f8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0779fb0 to 0xe0779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85093fc0 INFO: task kworker/0:271:3913 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9628a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:3916 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0799d84 r8:00000002 r7:60000113 r6:e0799d8c r5:84f8bc00 r4:84f8bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0799e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a30c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85034f8c r4:85034c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85034f8c r4:8509a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8bc00 r8:8509a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a580 r8:8027f5e8 r7:e0781e60 r6:8509a600 r5:84f8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0799fb0 to 0xe0799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3080 INFO: task kworker/0:272:3916 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 966d3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:3918 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07add84 r8:00000002 r7:60000113 r6:e07add8c r5:84f88000 r4:84f88000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f88000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f88000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503538c r4:85035000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503538c r4:8509a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f88000 r8:8509a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a500 r8:8027f5e8 r7:e0799e60 r6:8509a680 r5:84f88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07adfb0 to 0xe07adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3080 INFO: task kworker/0:273:3918 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 96b0a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:3920 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07b5d84 r8:00000002 r7:60000013 r6:e07b5d8c r5:84d0c800 r4:84d0c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503678c r4:85036400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503678c r4:8509a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0c800 r8:8509a72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a700 r8:8027f5e8 r7:e07ade60 r6:8509a780 r5:84d0c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b5fb0 to 0xe07b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3200 INFO: task kworker/0:274:3920 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 96fa6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:3922 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:84d0a400 r4:84d0a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503578c r4:85035400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503578c r4:8509a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0a400 r8:8509a82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a800 r8:8027f5e8 r7:e07b5e60 r6:8509a880 r5:84d0a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c9fb0 to 0xe07c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3340 INFO: task kworker/0:275:3922 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 96fa6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:3925 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07d1d84 r8:00000002 r7:60000013 r6:e07d1d8c r5:847c8000 r4:847c8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85035b8c r4:85035800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85035b8c r4:8509a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8000 r8:8509a92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a900 r8:8027f5e8 r7:e07b5e60 r6:8509a980 r5:847c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3500 INFO: task kworker/0:276:3925 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 97160000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:3927 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:3927 tgid:3927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07fdd84 r8:00000002 r7:60000013 r6:e07fdd8c r5:847c8c00 r4:847c8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85035f8c r4:85035c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85035f8c r4:8509aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8c00 r8:8509aa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509aa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509aa00 r8:8027f5e8 r7:e07b5e60 r6:8509aa80 r5:847c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07fdfb0 to 0xe07fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3640 INFO: task kworker/0:277:3927 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 97160000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:3928 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07a1d84 r8:00000002 r7:60000113 r6:e07a1d8c r5:847c9800 r4:847c9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503638c r4:85036000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503638c r4:8509ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c9800 r8:8509ab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509ab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509ab00 r8:8027f5e8 r7:e07b5e60 r6:8509ab80 r5:847c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a1fb0 to 0xe07a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3640 INFO: task kworker/0:278:3928 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 97c42000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:3930 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e07edd84 r8:00000002 r7:60000113 r6:e07edd8c r5:847ca400 r4:847ca400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ca400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e082b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503738c r4:85037000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503738c r4:8509ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ca400 r8:8509ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509ac00 r8:8027f5e8 r7:e07b5e60 r6:8509ac80 r5:847ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3c00 INFO: task kworker/0:279:3930 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 97c83000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:3932 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0815d84 r8:00000002 r7:60000113 r6:e0815d8c r5:847cb000 r4:847cb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0815e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0803000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85036b8c r4:85036800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85036b8c r4:8509ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cb000 r8:8509ad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509ad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509ad00 r8:8027f5e8 r7:e07ede60 r6:8509ad80 r5:847cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0815fb0 to 0xe0815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3ac0 INFO: task kworker/0:280:3932 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 98805000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:3933 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0825d84 r8:00000002 r7:60000013 r6:e0825d8c r5:847cbc00 r4:847cbc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cbc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0819000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85036f8c r4:85036c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85036f8c r4:8509ae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cbc00 r8:8509ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509ae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509ae00 r8:8027f5e8 r7:e07ede60 r6:8509ae80 r5:847cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0825fb0 to 0xe0825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3ac0 INFO: task kworker/0:281:3933 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 98805000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:3936 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e081dd84 r8:00000002 r7:60000013 r6:e081dd8c r5:847cc800 r4:847cc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e081de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d9cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df93f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503778c r4:85037400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8503778c r4:8509af00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cc800 r8:8509af2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509af00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509af00 r8:8027f5e8 r7:e07ede60 r6:8509af80 r5:847cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe081dfb0 to 0xe081dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a3fc0 INFO: task kworker/0:282:3936 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 989af000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:3937 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:283 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:847cd400 r4:847cd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85037b8c r4:85037800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85037b8c r4:8509a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cd400 r8:8509a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509a000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509a000 r8:8027f5e8 r7:e081de60 r6:850bc000 r5:847cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9d80 INFO: task kworker/0:283:3937 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 99059000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85110000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85037f8c r4:85037c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85037f8c r4:850bc080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110000 r8:850bc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc080 r8:8027f5e8 r7:e0639e60 r6:850bc100 r5:85110000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b8100 INFO: task kworker/0:284:3940 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 99059000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84faa100 r10:82918930 r9:e067dd84 r8:00000002 r7:60000113 r6:e067dd8c r5:85111800 r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc33000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504438c r4:85044000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504438c r4:850bc180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85111800 r8:850bc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc180 r8:8027f5e8 r7:e0679e60 r6:850bc200 r5:85111800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85113000 r4:8291892c r5:00001000 r4:dfc75000 r5:8504478c r4:85044400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85113000 r8:850bc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc280 r8:8027f5e8 r7:e067de60 r6:850bc300 r5:85113000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b8500 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dfcb9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85113c00 r8:850bc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc380 r8:8027f5e8 r7:e06e5e60 r6:850bc400 r5:85113c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0835fb0 to 0xe0835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b8740 INFO: task kworker/0:287:3947 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 99d1d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfd01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85044f8c r4:850bc480 Exception stack(0xe085dfb0 to 0xe085dff8) Call trace: r4:82ac11e4 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:3951 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0861d84 r8:00000002 r7:60000113 r6:e0861d8c r5:85115400 r4:85115400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85115400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0861e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9a562000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:3953 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0865d84 r8:00000002 r7:60000013 r6:e0865d8c r5:85116000 r4:85116000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:85116000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:00001000 r4:dff2b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8504538c r4:850bc680 r4:850bc680 Exception stack(0xe0865fb0 to 0xe0865ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:3955 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0829d84 r8:00000002 r7:60000013 r6:e0829d8c r5:84ff8000 r4:84ff8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ff8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0829e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ff8000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff99000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504578c r4:85045400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504578c r4:850bc780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff8000 r8:850bc7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc780 r8:8027f5e8 r7:e0861e60 r6:85072680 r5:84ff8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0829fb0 to 0xe0829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9100 INFO: task kworker/0:291:3955 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9ae7b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:3956 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:3956 tgid:3956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0869d84 r8:00000002 r7:60000113 r6:e0869d8c r5:84ff8c00 r4:84ff8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ff8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0869e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b95c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ff8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504638c r4:85046000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504638c r4:850bc800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ff8c00 r8:850bc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc800 r8:8027f5e8 r7:e0861e60 r6:85072700 r5:84ff8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0869fb0 to 0xe0869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9280 INFO: task kworker/0:292:3956 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9b875000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:3959 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e086dd84 r8:00000002 r7:60000113 r6:e086dd8c r5:84ffd400 r4:84ffd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ffd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e086de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b92c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffd400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85045f8c r4:85045c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85045f8c r4:850bc880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ffd400 r8:850bc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc880 r8:8027f5e8 r7:e0869e60 r6:85072780 r5:84ffd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe086dfb0 to 0xe086dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9280 INFO: task kworker/0:293:3959 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9b875000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:3960 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0871d84 r8:00000002 r7:60000013 r6:e0871d8c r5:84c96c00 r4:84c96c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c96c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504678c r4:85046400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504678c r4:850bc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c96c00 r8:850bc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc900 r8:8027f5e8 r7:e0869e60 r6:85072800 r5:84c96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0871fb0 to 0xe0871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b90c0 INFO: task kworker/0:294:3960 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9bc16000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:128:3963 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:128 state:D stack:0 pid:3963 tgid:3963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:84f90000 r4:84f90000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f90000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ad580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f90000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0645000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2738c r4:84f27000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f2738c r4:85072880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f90000 r8:850728ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85072880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85072880 r8:8027f5e8 r7:e06cde60 r6:85072900 r5:84f90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ad9c0 INFO: task kworker/1:128:3963 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9c272000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:3965 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0879d84 r8:00000002 r7:60000113 r6:e0879d8c r5:84f90c00 r4:84f90c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f90c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85046b8c r4:85046800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85046b8c r4:850bc980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f90c00 r8:850bc9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc980 r8:8027f5e8 r7:e0871e60 r6:85072980 r5:84f90c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0879fb0 to 0xe0879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9700 INFO: task kworker/0:295:3965 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9c272000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:3967 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e087dd84 r8:00000002 r7:60000113 r6:e087dd8c r5:84f91800 r4:84f91800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f91800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e087de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f91800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0123000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85046f8c r4:85046c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85046f8c r4:850bca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f91800 r8:850bca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bca00 r8:8027f5e8 r7:e0879e60 r6:85072a00 r5:84f91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe087dfb0 to 0xe087dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9800 INFO: task kworker/0:296:3967 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9c418000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:3969 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4885d84 r8:00000002 r7:60000013 r6:e4885d8c r5:84f92400 r4:84f92400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f92400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4885e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f92400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e013d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504738c r4:85047000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504738c r4:850bca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f92400 r8:850bcaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bca80 r8:8027f5e8 r7:e087de60 r6:85072a80 r5:84f92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4885fb0 to 0xe4885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9940 INFO: task kworker/0:297:3969 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9c60d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:3971 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4889d84 r8:00000002 r7:60000013 r6:e4889d8c r5:84f93000 r4:84f93000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f93000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4889e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f93000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0149000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504778c r4:85047400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504778c r4:850bcb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f93000 r8:850bcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bcb00 r8:8027f5e8 r7:e4885e60 r6:85072b00 r5:84f93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4889fb0 to 0xe4889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9800 INFO: task kworker/0:298:3971 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9c7d0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:3973 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e488dd84 r8:00000002 r7:60000013 r6:e488dd8c r5:84f93c00 r4:84f93c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f93c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e488de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b9d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0169000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85047b8c r4:85047800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85047b8c r4:850bcb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f93c00 r8:850bcbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bcb80 r8:8027f5e8 r7:e4889e60 r6:85072b80 r5:84f93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe488dfb0 to 0xe488dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9c00 INFO: task kworker/0:299:3973 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9c98f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:3975 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4895d84 r8:00000002 r7:60000013 r6:e4895d8c r5:84f94800 r4:84f94800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f94800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4895e08 r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e06e9000 r5:8504838c r4:85048000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504838c r4:850bcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f94800 r8:850bcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bcc00 r8:8027f5e8 r7:e488de60 r6:85072c00 r5:84f94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4895fb0 to 0xe4895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b9c40 INFO: task kworker/0:300:3975 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e056b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850b3080 INFO: task kworker/1:129:3978 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9cf7d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:00001000 r4:dfe9b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84faa100 r4:84f96000 r4:00000000 r9:83018205 r8:84f96000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0681000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f27b8c r4:84f27800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f27b8c r4:85072d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f96000 r8:85072dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85072d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85072d80 r8:8027f5e8 r7:e0875e60 r6:85072e00 r5:84f96000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4899fb0 to 0xe4899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b3080 INFO: task kworker/1:130:3979 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r4:84fab300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:131 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:84f27f8c r4:84f27c00 r10:61c88647 r9:84f96c00 r8:85072eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9d296000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:3982 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8680 r5:00001000 r4:e06b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85047f8c r4:85047c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85047f8c r4:850bcc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85000000 r8:850bccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bcc80 r8:8027f5e8 r7:e4895e60 r6:85072f80 r5:85000000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48a5fb0 to 0xe48a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b8f80 INFO: task kworker/0:301:3982 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9d483000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:132:3985 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48a1d84 r8:00000002 r7:60000113 r6:e48a1d8c r5:85000c00 r4:85000c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85000c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48a1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b35c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85000c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4538c r4:84d45000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4538c r4:85072480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85072480 r8:8027f5e8 r7:e0875e60 r6:850b2000 r5:85000c00 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84faa100 r10:82918930 r9:e48add84 r8:00000002 r7:60000013 r6:e48add8c r5:85001800 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0839000 r5:85048f8c r4:85048c00 r4:850bcd00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:3989 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48a9d84 r8:00000002 r7:60000113 r6:e48a9d8c r5:85002400 r4:85002400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85002400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ab380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85002400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504878c r4:85048400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504878c r4:850bcd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85002400 r8:850bcdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bcd80 r8:8027f5e8 r7:e48ade60 r6:850b2100 r5:85002400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48a9fb0 to 0xe48a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ab000 INFO: task kworker/0:303:3989 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9d86e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:133 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0717000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3994 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48b1d84 r8:00000002 r7:60000013 r6:e48b1d8c r5:85003c00 r4:85003c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85003c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851831c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85003c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d44f8c r4:84d44c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d44f8c r4:850b2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85003c00 r8:850b22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2280 r8:8027f5e8 r7:e0875e60 r6:850b2300 r5:85003c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48b1fb0 to 0xe48b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b3580 INFO: task kworker/1:134:3994 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9db79000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c9e08 r5:00001000 r4:e48bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8504938c r4:85049000 r4:00000001 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:3997 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:3997 tgid:3997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48d9d84 r8:00000002 r7:60000013 r6:e48d9d8c r5:85006c00 r4:85006c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85006c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850abb00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85006c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85049b8c r4:85049800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85049b8c r4:850bce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85006c00 r8:850bceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bce80 r8:8027f5e8 r7:e48c9e60 r6:850b2400 r5:85006c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48d9fb0 to 0xe48d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850aba40 INFO: task kworker/0:305:3997 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9df74000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:3998 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48e5d84 r8:00000002 r7:60000113 r6:e48e5d8c r5:85004800 r4:85004800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85004800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ab900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85004800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504978c r4:85049400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504978c r4:850bcf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85004800 r8:850bcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe48e5fb0 to 0xe48e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e48c1d84 r8:00000002 r7:60000113 r6:e48c1d8c r5:85112400 r4:00000000 r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 r5:00001000 r4:e8901000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85112400 r8:850bcfac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4002 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48b9d84 r8:00000002 r7:60000113 r6:e48b9d8c r5:85110c00 r4:85110c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85110c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850abcc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85110c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85049f8c r4:85049c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85049f8c r4:850a8080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110c00 r8:850a80ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a8080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:850abac0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85116c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48e9e08 r5:00001000 r4:e48f1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850a8180 r8:8027f5e8 r7:e48c1e60 r6:850a8200 r5:85116c00 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4007 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e48f5d84 r8:00000002 r7:60000113 r6:e48f5d8c r5:847ce000 r4:847ce000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ce000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ab480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504ab8c r4:8504a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504ab8c r4:850a8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ce000 r8:850a82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a8280 r8:8027f5e8 r7:e48c1e60 r6:850a8300 r5:847ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9e828000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8909e08 r5:00001000 r4:e8911000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504af8c r4:8504ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504af8c r4:850a8380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cec00 r8:850a83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a8380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a8380 r8:8027f5e8 r7:e48f5e60 r6:850a8400 r5:847cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8909fb0 to 0xe8909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850abfc0 INFO: task kworker/0:311:4009 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9e828000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 INFO: task kworker/0:312:4011 blocked for more than 455 seconds. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e8925000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:312:4011 is blocked on a mutex likely owned by task kworker/0:187:3720. r4:82ac11e4 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:e891dd84 r8:00000002 r7:60000113 r6:e891dd8c r5:85128c00 r5:00001000 r4:e891f000 r5:8504b38c r4:8504b000 r4:850a8580 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85129800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:df9a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504bb8c r4:8504b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504bb8c r4:850a8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85129800 r8:850a86ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a8680 r8:8027f5e8 r7:e8915e60 r6:850a8700 r5:85129800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8929fb0 to 0xe8929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b4300 INFO: task kworker/0:314:4015 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4640 r5:00001000 r4:df9f1000 r10:61c88647 r9:8512a400 r8:850a87ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9f150000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07dde08 r5:00001000 r4:dfa5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8514438c r4:85144000 r4:850a8880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84faa100 task:kworker/0:317 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfaf9000 r5:8514478c r4:85144400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514478c r4:850a8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512bc00 r8:850a89ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a8980 r8:8027f5e8 r7:e07dde60 r6:850a8a00 r5:8512bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8935fb0 to 0xe8935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b4740 INFO: task kworker/0:317:4022 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9f6a5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e893de08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:850a8a80 Exception stack(0xe893dfb0 to 0xe893dff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:319:4024 blocked for more than 455 seconds. r4:8512d400 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfd6b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85144b8c r4:850a8b80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48fdfb0 to 0xe48fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b4840 INFO: task kworker/0:319:4024 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 9fe0e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4027 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4027 tgid:4027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8941d84 r8:00000002 r7:60000013 r6:e8941d8c r5:8512e000 r4:8512e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8941e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8512e000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8514538c r4:85145000 r4:850a8c80 Exception stack(0xe8941fb0 to 0xe8941ff8) INFO: task kworker/0:320:4027 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e8949d84 r8:00000002 r7:60000113 r6:e8949d8c r5:84728000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e00ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8514578c r4:85145400 r10:61c88647 r9:84728000 r8:850a8dac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:322:4031 blocked for more than 455 seconds. r4:84728c00 r4:00000000 r4:00000000 r5:00001000 r4:e047b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe894dfb0 to 0xe894dff8) INFO: task kworker/0:322:4031 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:135:4033 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:135 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8951d84 r8:00000002 r7:60000113 r6:e8951d8c r5:84729800 r4:84729800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84729800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8951e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84729800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d44b8c r4:84d44800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d44b8c r4:850b2500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84729800 r8:850b252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2500 r8:8027f5e8 r7:e0875e60 r6:850a8f80 r5:84729800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8951fb0 to 0xe8951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:135:4033 is blocked on a mutex likely owned by task kworker/0:187:3720. Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4037 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8472a400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e04dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85181000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8472b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8959e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8955e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8472c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514678c r4:85146400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514678c r4:85181200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472c800 r8:8518122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85181200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181200 r8:8027f5e8 r7:e8945e60 r6:85181280 r5:8472c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8955fb0 to 0xe8955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8517e400 INFO: task kworker/0:325:4041 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a19d7000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4042 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8961d84 r8:00000002 r7:60000113 r6:e8961d8c r5:8472d400 r4:8472d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:136:4043 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:136 state:D stack:0 pid:4043 tgid:4043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8969d84 r8:00000002 r7:60000113 r6:e8969d8c r5:8472ec00 r4:8472ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8472ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8969e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851836c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8472ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ec38c r4:850b2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472ec00 r8:850b25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2580 r8:8027f5e8 r7:e0875e60 r6:85181400 r5:8472ec00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8975d84 r8:00000002 r7:60000113 r6:e8975d8c r5:84ca0000 r4:84ca0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8975e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ca0000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ecf8c r4:850ecc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ecf8c r4:850b2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca0000 r8:850b262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe8975fb0 to 0xe8975ff8) INFO: task kworker/1:137:4047 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84ca0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85181500 Exception stack(0xea985fb0 to 0xea985ff8) INFO: task kworker/0:327:4048 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:4049 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:84ca1800 r4:84ca1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ca1800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ecb8c r4:850ec800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ecb8c r4:850b2680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca1800 r8:850b26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2680 r8:8027f5e8 r7:e8975e60 r6:85181600 r5:84ca1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85183740 INFO: task kworker/1:138:4049 is blocked on a mutex likely owned by task kworker/0:187:3720. r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e8971d84 r8:00000002 r7:60000013 r6:e8971d8c r5:84ca2400 r4:00000000 r9:83018005 r8:84ca2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:e05a9000 r7:dddced80 r6:83018000 r5:85146f8c r4:85181680 r4:85181680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181680 r8:8027f5e8 r7:ea985e60 r6:85181700 r5:84ca2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8971fb0 to 0xe8971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8517ecc0 INFO: task kworker/0:328:4051 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a30fd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:329 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca3000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514778c r4:85147400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514778c r4:85181780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca3000 r8:851817ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85181780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181780 r8:8027f5e8 r7:ea985e60 r6:85181800 r5:84ca3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8965fb0 to 0xe8965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ad0c0 INFO: task kworker/0:329:4054 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 task:kworker/0:330 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85147b8c r4:85147800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85147b8c r4:85181880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123000 r8:851818ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85181880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181880 r8:8027f5e8 r7:e8965e60 r6:850b2700 r5:85123000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08 r9:83018005 r8:85124800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:00001000 r4:e062b000 r7:dddced80 r6:83018000 r5:85147f8c r4:85181900 r10:00000000 r9:85181900 r8:8027f5e8 r7:ea999e60 r6:850b2780 r5:85124800 INFO: task kworker/0:331:4059 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:4060 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea98dd84 r8:00000002 r7:60000113 r6:ea98dd8c r5:84ca3c00 r4:84ca3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851893c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0719000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515038c r4:85150000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515038c r4:85181980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca3c00 r8:851819ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85181980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181980 r8:8027f5e8 r7:ea9ade60 r6:85181a00 r5:84ca3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r9:83018005 r8:84ca4800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 r5:00001000 r4:e0785000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea9b1fb0 to 0xea9b1ff8) INFO: task kworker/0:333:4063 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4064 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4064 tgid:4064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e896dd84 r8:00000002 r7:60000013 r6:e896dd8c r5:84ca5400 r4:84ca5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e896de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0791000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85150b8c r4:85150800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85150b8c r4:85181c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca5400 r8:85181c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85181c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181c00 r8:8027f5e8 r7:ea9b1e60 r6:85181c80 r5:84ca5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe896dfb0 to 0xe896dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85189400 INFO: task kworker/0:334:4064 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ca6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r5:00001000 r4:e079d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84ca6c00 r8:85181aac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84faa100 task:kworker/0:336 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8472e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:00001000 r4:e07e1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515138c r4:85151000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515138c r4:85181d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472e000 r8:85181dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85181d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85181d80 r8:8027f5e8 r7:ea9b9e60 r6:85181e00 r5:8472e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85189900 INFO: task kworker/0:336:4068 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a414b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:4071 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9c9d84 r8:00000002 r7:60000113 r6:ea9c9d8c r5:85138000 r4:85138000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85138000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85138000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ed38c r4:850ed000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ed38c r4:850b2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138000 r8:850b282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2800 r8:8027f5e8 r7:e8975e60 r6:85181e80 r5:85138000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85183a80 INFO: task kworker/1:139:4071 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a4bbf000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e054d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:850efb8c r4:850b2880 r10:61c88647 r9:85139800 r8:850b28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:4074 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:8513a400 r4:8513a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b3d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8513a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ed78c r4:850ed400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ed78c r4:850b2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513a400 r8:850b292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2900 r8:8027f5e8 r7:ea9d1e60 r6:85181f80 r5:8513a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85183940 INFO: task kworker/1:141:4074 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a52a8000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8513bc00 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea99b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85151b8c r4:8518e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513bc00 r8:8518e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e000 r8:8027f5e8 r7:ea9bde60 r6:8518e080 r5:8513bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85189f80 INFO: task kworker/0:337:4075 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a5589000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:4078 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9e1d84 r8:00000002 r7:60000113 r6:ea9e1d8c r5:8513c800 r4:8513c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8513c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0817000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850edb8c r4:850ed800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850edb8c r4:850b2980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513c800 r8:850b29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2980 r8:8027f5e8 r7:ea9d1e60 r6:8518e100 r5:8513c800 Exception stack(0xea9e1fb0 to 0xea9e1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:82ac11e4 r4:e04e9dc0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:4079 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:8513d400 r4:8513d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8513d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e082d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850edf8c r4:850edc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850edf8c r4:850b2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513d400 r8:850b2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2a00 r8:8027f5e8 r7:ea9d1e60 r6:850b2a80 r5:8513d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8518b080 INFO: task kworker/1:143:4079 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a5903000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e04e9dc0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4082 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9b5d84 r8:00000002 r7:60000013 r6:ea9b5d8c r5:85120c00 r4:85120c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85120c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851885c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85151f8c r4:85151c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85151f8c r4:8518e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120c00 r8:8518e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e180 r8:8027f5e8 r7:ea9d9e60 r6:850b2b80 r5:85120c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b5fb0 to 0xea9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851882c0 INFO: task kworker/0:338:4082 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a5c35000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:4083 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:85121800 r4:85121800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85121800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85121800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8979000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515178c r4:85151400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515178c r4:850b2b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85121800 r8:850b2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2b00 r8:8027f5e8 r7:ea9d1e60 r6:850b2c00 r5:85121800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8518b180 INFO: task kworker/1:144:4083 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a625a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:4085 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:85125400 r4:85125400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85125400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851871c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85125400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515c38c r4:8515c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515c38c r4:850b2c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85125400 r8:850b2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2c80 r8:8027f5e8 r7:ea9d1e60 r6:850b2d00 r5:85125400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f5fb0 to 0xea9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8518b180 INFO: task kworker/1:145:4085 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a625a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4089 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa19d84 r8:00000002 r7:60000013 r6:eaa19d8c r5:85123c00 r4:85123c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85123c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851886c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515238c r4:85152000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515238c r4:8518e200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123c00 r8:8518e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e200 r8:8027f5e8 r7:ea9b5e60 r6:850b2d80 r5:85123c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa19fb0 to 0xeaa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188540 INFO: task kworker/0:339:4089 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a679f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4091 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4091 tgid:4091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:85126000 r4:85126000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85126000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85188840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515278c r4:85152400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515278c r4:8518e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126000 r8:8518e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e280 r8:8027f5e8 r7:eaa19e60 r6:850b2e00 r5:85126000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188980 INFO: task kworker/0:340:4091 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a690e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:85122400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:00001000 r4:eaa2d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85152f8c r4:85152c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85152f8c r4:8518e300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85122400 r8:8518e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e300 r8:8027f5e8 r7:eaa21e60 r6:850b2e80 r5:85122400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188780 INFO: task kworker/0:341:4092 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a6b7a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4094 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4094 tgid:4094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa31d84 r8:00000002 r7:60000013 r6:eaa31d8c r5:85120000 r4:85120000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85120000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851889c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85152b8c r4:85152800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85152b8c r4:8518e380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120000 r8:8518e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e380 r8:8027f5e8 r7:eaa25e60 r6:850b2f00 r5:85120000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188a40 INFO: task kworker/0:342:4094 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a6f55000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4096 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4096 tgid:4096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa41d84 r8:00000002 r7:60000113 r6:eaa41d8c r5:85126c00 r4:85126c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85126c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85188ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85126c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85153b8c r4:85153800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85153b8c r4:8518e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126c00 r8:8518e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e400 r8:8027f5e8 r7:eaa25e60 r6:850b2f80 r5:85126c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188cc0 INFO: task kworker/0:343:4096 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a6f55000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4098 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa45d84 r8:00000002 r7:60000013 r6:eaa45d8c r5:8512ec00 r4:8512ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85188640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8512ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515338c r4:85153000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515338c r4:8518e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512ec00 r8:8518e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e480 r8:8027f5e8 r7:eaa41e60 r6:85190000 r5:8512ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188c40 INFO: task kworker/0:344:4098 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a7077000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa3d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85006000 r8:8518e52c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85188bc0 INFO: task kworker/0:345:4101 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a7aba000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4102 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa61d84 r8:00000002 r7:60000013 r6:eaa61d8c r5:85008000 r4:85008000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85008000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85008000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85153f8c r4:85153c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85153f8c r4:8518e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85008000 r8:8518e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e580 r8:8027f5e8 r7:eaa41e60 r6:85190100 r5:85008000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85008c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85008c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851873c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85008c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515c78c r4:8515c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515c78c r4:8518e600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85008c00 r8:8518e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e600 r8:8027f5e8 r7:eaa61e60 r6:85190180 r5:85008c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85187240 INFO: task kworker/0:347:4104 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a7aba000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85009800 r5:85009800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85009800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df949000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515df8c r4:8515dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515df8c r4:8518e680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851872c0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 r4:8500a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8515d78c r4:8515d400 r4:85190280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:4110 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:8500b000 r4:8500b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8500b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cb8c r4:8515c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515cb8c r4:8518e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:8518e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e700 r8:8027f5e8 r7:eaa15e60 r6:85190380 r5:8500b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:8500c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187640 r5:00001000 r4:eaa87000 r7:dddced80 r6:83018000 r5:8515cf8c r4:8518e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500c800 r8:8518e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e780 r8:8027f5e8 r7:eaa15e60 r6:85190400 r5:8500c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85187500 INFO: task kworker/0:350:4111 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a885a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:8500bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515d38c r4:8518e800 Exception stack(0xeaa99fb0 to 0xeaa99ff8) r4:85187600 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8500ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 r5:00001000 r4:eaaad000 r7:dddced80 r6:83018000 r5:8515db8c r4:8518e880 Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:4117 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:8500d400 r4:8500d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:e049b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:850ef38c r4:85190580 Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) INFO: task kworker/1:147:4117 is blocked on a mutex likely owned by task kworker/0:187:3720. Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfca3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515ef8c r4:8518e900 Exception stack(0xeaac1fb0 to 0xeaac1ff8) r4:85187bc0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4121 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:847b1800 r4:847b1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515e38c r4:8515e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515e38c r4:8518ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b1800 r8:8518ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ea00 r8:8027f5e8 r7:eaac1e60 r6:85190700 r5:847b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85187bc0 INFO: task kworker/0:354:4121 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a94df000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eaacdd84 r8:00000002 r7:60000013 r6:eaacdd8c r5:847b0000 r4:847b0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbaf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515e78c r4:8515e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515e78c r4:8518e980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b0000 r8:8518e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518e980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518e980 r8:8027f5e8 r7:eaac1e60 r6:85190780 r5:847b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85187c00 INFO: task kworker/0:355:4123 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: a9ae8000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:356 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r5:00001000 r4:dfc43000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaad5fb0 to 0xeaad5ff8) r4:85187d40 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4127 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:847b3000 r4:847b3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85188400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:00001000 r4:dff87000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515f78c r4:8518eb00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/0:358:4129 blocked for more than 456 seconds. r4:847b2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r5:00001000 r4:dfd15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515f38c r4:8518eb80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: aa466000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4131 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaedd84 r8:00000002 r7:60000113 r6:eaaedd8c r5:847b6000 r4:847b6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bf40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515fb8c r4:8515f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515fb8c r4:8518ec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b6000 r8:8518ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518ec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ec00 r8:8027f5e8 r7:eaadde60 r6:85190980 r5:847b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:847b5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r5:00001000 r4:e06f3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8518ec80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:361:4135 blocked for more than 456 seconds. r4:847b4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0017000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ff8c r4:8515fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515ff8c r4:8518ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b4800 r8:8518ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ed00 r8:8027f5e8 r7:eaaf5e60 r6:85190a80 r5:847b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaafdfb0 to 0xeaafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85188d80 INFO: task kworker/0:361:4135 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: aab0f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r9:83018005 r8:847b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:00001000 r4:e00cb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:4139 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:851f8c00 r4:851f8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a32c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516078c r4:85160400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516078c r4:8518ee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f8c00 r8:8518ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ee00 r8:8027f5e8 r7:eaaf5e60 r6:85190b80 r5:851f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a3080 INFO: task kworker/0:363:4139 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: aaee0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:364:4141 blocked for more than 456 seconds. r4:851f8000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r5:00001000 r4:e012b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85160b8c r4:85160800 r10:61c88647 r9:851f8000 r8:8518eeac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4143 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:851f9800 r4:851f9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0147000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85160f8c r4:85160c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85160f8c r4:8518ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f9800 r8:8518ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ef00 r8:8027f5e8 r7:eaaf5e60 r6:85190c80 r5:851f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a3340 INFO: task kworker/0:365:4143 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ab3a5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:e04e9dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0474000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516138c r4:85161000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516138c r4:8518ef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fbc00 r8:8518efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8518ef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ef80 r8:8027f5e8 r7:eaaf5e60 r6:85190d00 r5:851fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a3480 INFO: task kworker/0:366:4145 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: aba3b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:851fb000 r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0659000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:851a3640 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:368 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85161b8c r4:85161800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85161b8c r4:851af080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fa400 r8:851af0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851af080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851af080 r8:8027f5e8 r7:eaaf5e60 r6:85190e00 r5:851fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a3780 INFO: task kworker/0:368:4149 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: abd1c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4151 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:851fc800 r8:851af12c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4154 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab41d84 r8:00000002 r7:60000113 r6:eab41d8c r5:851fe000 r4:851fe000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851fe000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516278c r4:85162400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516278c r4:851af180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fe000 r8:851af1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851af180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851af180 r8:8027f5e8 r7:eaaf5e60 r6:85190f00 r5:851fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab41fb0 to 0xeab41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a3b00 INFO: task kworker/0:370:4154 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0831000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85162b8c r4:85162800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85162b8c r4:851af280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fd400 r8:851af2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851af280 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:372:4157 blocked for more than 457 seconds. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516338c r4:851af200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500e000 r8:851af22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851af200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851af200 r8:8027f5e8 r7:eab49e60 r6:851bd000 r5:8500e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a3f40 INFO: task kworker/0:372:4157 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ac5fd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:85200c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r5:00001000 r4:e48bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab55fb0 to 0xeab55ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:4161 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:4161 tgid:4161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab5dd84 r8:00000002 r7:60000013 r6:eab5dd8c r5:85200000 r4:85200000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85200000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851870c0 INFO: task kworker/0:374:4161 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ac9d5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516378c r4:85163400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516378c r4:851af380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85201800 r8:851af3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851af380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851af380 r8:8027f5e8 r7:eab5de60 r6:851bd180 r5:85201800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85202400 r4:8291892c [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85163b8c r4:851af480 r4:851af480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851af480 r8:8027f5e8 r7:eab5de60 r6:851bd200 r5:85202400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851be2c0 INFO: task kworker/0:376:4165 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ad12f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r5:00001000 r4:e48f9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e890d000 r7:dddced80 r6:83018000 r5:8516438c r4:851af580 r4:851be240 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:4171 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab85d84 r8:00000002 r7:60000013 r6:eab85d8c r5:85203000 r4:85203000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85203000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851be580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85203000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8919000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516478c r4:85164400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516478c r4:851af600 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:e892b000 r10:00000000 r9:851af680 r8:8027f5e8 r7:eab5de60 r6:851bd400 r5:85203c00 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4175 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:85206000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r5:00001000 r4:eab8d000 r4:851af700 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ea6b8c r4:84ea6800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:8516538c r4:85165000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4179 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabb9d84 r8:00000002 r7:60000113 r6:eabb9d8c r5:85209800 r4:85209800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85209800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bea00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85209800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85209800 r8:851af82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r5:85165b8c r4:85165800 Exception stack(0xeabc1fb0 to 0xeabc1ff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4183 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:8520a400 r4:8520a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:df9bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:dfedb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bed80 INFO: task kworker/0:386:4184 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: aeb9d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:387:4187 blocked for more than 457 seconds. [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfacf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516678c r4:85166400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516678c r4:851afa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520c800 r8:851afa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851afa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851afa00 r8:8027f5e8 r7:eaa79e60 r6:851bd780 r5:8520c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736280 INFO: task kworker/0:387:4187 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r5:85166b8c r4:85166800 Exception stack(0xeabcdfb0 to 0xeabcdff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r5:85166f8c r4:85166c00 r10:00000000 r9:851afb00 r8:8027f5e8 r7:eaa79e60 r6:851bd880 r5:8520e000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85245540 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4195 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabd9d84 r8:00000002 r7:60000013 r6:eabd9d8c r5:851fec00 r4:851fec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851fec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85245700 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82918930 r9:ea9f9d84 r8:00000002 r7:60000013 r6:ea9f9d8c r5:85206c00 r5:00001000 r4:e0503000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: af4e5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ea6b8c r4:84ea6800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0631000 r7:dddced80 r6:83018000 r5:8516938c r4:851afc80 r4:852457c0 Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r10:82918930 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:85212400 r5:00001000 r4:e058b000 r10:61c88647 r9:85212400 r8:851afdac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4205 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:85210c00 r4:85210c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8516878c r4:851afe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4207 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4207 tgid:4207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:85213c00 r4:85213c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85213c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85245b80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85213c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85168b8c r4:851aff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:851aff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aff00 r8:8027f5e8 r7:eabe1e60 r6:851bdc00 r5:85213c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85245a40 INFO: task kworker/0:396:4207 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:85213000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05f5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85168f8c r4:85168c00 r7:dddced80 r6:83018000 r5:85168f8c r4:851afe80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: afd6c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4211 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85215400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r5:00001000 r4:e0783000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516978c r4:85169400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516978c r4:851aff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85215400 r8:851affac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aff80 r8:8027f5e8 r7:eabe1e60 r6:851bdd00 r5:85215400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85245a40 INFO: task kworker/0:398:4211 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: afd6c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac0dd84 r8:00000002 r7:60000113 r6:eac0dd8c r5:85214800 r4:85214800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85214800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85214800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85169b8c r4:85169800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85169b8c r4:85251000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:8525102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251000 r8:8027f5e8 r7:eac05e60 r6:851bdd80 r5:85214800 r4:00000001 Exception stack(0xeac0dfb0 to 0xeac0dff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8516a38c r4:8516a000 r4:85251080 Exception stack(0xeaa9dfb0 to 0xeaa9dff8) r4:85245ec0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:4217 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:85216000 r4:85216000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85216000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bed40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb79000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85169f8c r4:85169c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85169f8c r4:85251100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:8525112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251100 r8:8027f5e8 r7:eaa9de60 r6:851bde80 r5:85216000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736380 INFO: task kworker/0:401:4217 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/0:402:4219 blocked for more than 457 seconds. r10:82918930 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:85218c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85218c00 r8:852511ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251180 r8:8027f5e8 r7:eaa9de60 r6:851bdf00 r5:85218c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259080 INFO: task kworker/0:402:4219 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b09d9000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:403:4222 blocked for more than 457 seconds. r4:8521a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r5:00001000 r4:e0111000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8516b78c r4:8516b400 r7:dddced80 r6:83018000 r5:8516b78c r4:85251200 Exception stack(0xeabc9fb0 to 0xeabc9ff8) r4:852592c0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85219800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85219800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85219800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff61000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ab8c r4:8516a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516ab8c r4:85251280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85219800 r8:852512ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251280 r8:8027f5e8 r7:eabc9e60 r6:85263000 r5:85219800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852592c0 INFO: task kworker/0:404:4223 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:405:4225 blocked for more than 457 seconds. r10:82918930 r9:eaa05d84 r8:00000002 r7:60000013 r6:eaa05d8c r5:85138c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dffe9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8513ec00 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e003d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516b38c r4:8516b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516b38c r4:85251400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513ec00 r8:8525142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251400 r8:8027f5e8 r7:eabc9e60 r6:85251480 r5:8513ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259400 INFO: task kworker/0:406:4228 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b12cd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:4230 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:8513b000 r4:8513b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0141000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8516bb8c r4:8516b800 r4:85251500 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:4231 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac29d84 r8:00000002 r7:60000013 r6:eac29d8c r5:85216c00 r4:85216c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85216c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85216c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c38c r4:8516c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516c38c r4:85251600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216c00 r8:8525162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251600 Exception stack(0xeac29fb0 to 0xeac29ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:e04e9dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:4233 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac25d84 r8:00000002 r7:60000013 r6:eac25d8c r5:8520ec00 r4:8520ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259b80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516bf8c r4:8516bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516bf8c r4:85251700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520ec00 r8:8525172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251700 r8:8027f5e8 r7:eac29e60 r6:85251780 r5:8520ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259680 INFO: task kworker/0:409:4233 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c78c r4:8516c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516c78c r4:85251800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca6000 r8:8525182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251800 r8:8027f5e8 r7:eac29e60 r6:85251880 r5:84ca6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259c00 INFO: task kworker/0:410:4236 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b1ab4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4239 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa040 r5:00001000 r4:e0793000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85251900 Exception stack(0xeac35fb0 to 0xeac35ff8) r4:85259d80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:4240 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:84d30000 r4:84d30000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d30000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85245500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d30000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516cb8c r4:8516c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516cb8c r4:85251a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d30000 r8:85251a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251a00 r8:8027f5e8 r7:eac35e60 r6:85251a80 r5:84d30000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259d80 INFO: task kworker/0:412:4240 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b1de1000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84d31800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:00001000 r4:e07a7000 r5:8516d38c r4:8516d000 r10:61c88647 r9:84d31800 r8:85251b2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b21c3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4244 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac41d84 r8:00000002 r7:60000013 r6:eac41d8c r5:8521b000 r4:8521b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8521b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521b000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d78c r4:8516d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516d78c r4:85251c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521b000 r8:85251c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251c00 r8:8027f5e8 r7:eac3de60 r6:85263080 r5:8521b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852aa080 INFO: task kworker/0:414:4244 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4246 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac49d84 r8:00000002 r7:60000013 r6:eac49d8c r5:8521d400 r4:8521d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8521d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521d400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516db8c r4:8516d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516db8c r4:85251c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521d400 r8:85251cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251c80 r8:8027f5e8 r7:eac41e60 r6:85263100 r5:8521d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0801000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516df8c r4:8516dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516df8c r4:85251d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521ec00 r8:85251d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251d00 r8:8027f5e8 r7:eac49e60 r6:85263180 r5:8521ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852aa480 INFO: task kworker/0:416:4248 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b29d1000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:8521bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r5:00001000 r4:e4881000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8516e78c r4:8516e400 r4:85251d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:84ea6b8c r4:84ea6800 r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0821000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516e38c r4:8516e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516e38c r4:85251e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513e000 r8:85251e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251e00 r8:8027f5e8 r7:eac5de60 r6:85263280 r5:8513e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852aa600 INFO: task kworker/0:418:4252 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b2df8000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4254 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac65d84 r8:00000002 r7:60000113 r6:eac65d8c r5:85218000 r4:85218000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85218000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aab80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ef8c r4:8516ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516ef8c r4:85251e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:85251eac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:4255 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:8521e000 r4:8521e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8521e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aaac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516eb8c r4:8516e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516eb8c r4:85251f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521e000 r8:85251f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85251f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85251f00 r8:8027f5e8 r7:eac65e60 r6:85263380 r5:8521e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b321e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84faa100 r4:8521c800 r5:8521c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aacc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521c800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8903000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8516f38c r4:85251f80 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4259 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac71d84 r8:00000002 r7:60000013 r6:eac71d8c r5:85220000 r4:85220000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85220000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bb1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85220000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:00001000 r4:ea9a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac71fb0 to 0xeac71ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r5:00001000 r4:e8917000 r7:dddced80 r6:83018000 r5:8516f78c r4:852b8080 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4264 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:85223000 r4:85223000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85223000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e892d000 r10:61c88647 r9:85223000 r8:852b812c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9d28 to 0xe04e9d70) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8977000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85221800 r8:852b81ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:ea993000 r7:dddced80 r6:83018000 r5:8517438c r4:852b8200 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:84faa100 Workqueue: events bpf_prog_free_deferred r5:85220c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bb380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85220c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85174b8c r4:85174800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85174b8c r4:852b8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85220c00 r8:852b82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8280 r8:8027f5e8 r7:eac71e60 r6:85263700 r5:85220c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bb180 INFO: task kworker/0:427:4270 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfe9b000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bb640 r10:61c88647 r9:85225400 r8:852b832c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b5425000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:85226000 r4:85226000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85226000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea9db000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/0:430:4275 blocked for more than 458 seconds. [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:8517538c r4:85175000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bb7c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85228c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175b8c r4:85175800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85175b8c r4:852b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228c00 r8:852b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8480 r8:8027f5e8 r7:eac99e60 r6:85263900 r5:85228c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bb680 INFO: task kworker/0:431:4278 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:84fab300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:00001000 r4:e059f000 r10:61c88647 r9:85229800 r8:852b852c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bb740 INFO: task kworker/0:432:4279 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b683d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Exception stack(0xe04e9fb0 to 0xe04e9ff8) [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:00001000 r4:e04d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850ef78c r4:850ef400 r10:61c88647 r9:8522a400 r8:85263a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c9600 r5:00001000 r4:eaae9000 r7:ddde2d80 r6:83018200 r5:850eff8c r4:85263b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c9240 INFO: task kworker/1:149:4287 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b683d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 Exception stack(0xe04e9fb0 to 0xe04e9ff8) [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaadf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaca5fb0 to 0xeaca5ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:e05d5000 r5:8517638c r4:85176000 r10:61c88647 r9:8522c800 r8:852b85ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b7073000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4293 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaccdd84 r8:00000002 r7:60000013 r6:eaccdd8c r5:8522ec00 r4:8522ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8522ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bbf00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0621000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517678c r4:85176400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517678c r4:852b8600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522ec00 r8:852b862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8600 r8:8027f5e8 r7:eacc1e60 r6:85263d80 r5:8522ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bbdc0 INFO: task kworker/0:434:4293 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b7073000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:4294 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8522d400 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8517738c r4:852b8680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4295 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacb9d84 r8:00000002 r7:60000013 r6:eacb9d8c r5:84d33000 r4:84d33000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d33000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bba40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d33000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0789000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85176b8c r4:85176800 r7:dddced80 r6:83018000 r5:85176b8c r4:852b8700 r10:00000000 r9:852b8700 r8:8027f5e8 r7:eacd1e60 r6:852b8780 r5:84d33000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:4298 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:84d35400 r4:84d35400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d35400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d35400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85176f8c r4:85176c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85176f8c r4:852b8800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d35400 r8:852b882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8800 r8:8027f5e8 r7:eacd1e60 r6:852b8880 r5:84d35400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2180 INFO: task kworker/0:437:4298 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4300 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacd9d84 r8:00000002 r7:60000013 r6:eacd9d8c r5:84d36000 r4:84d36000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d36000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d36000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517778c r4:85177400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517778c r4:852b8900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d36000 r8:852b892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8900 r8:8027f5e8 r7:eacd1e60 r6:852b8980 r5:84d36000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2400 INFO: task kworker/0:438:4300 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b7f86000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:84ea6b8c r4:84ea6800 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:4302 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eace5d84 r8:00000002 r7:60000013 r6:eace5d8c r5:85223c00 r4:85223c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85223c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa33000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177b8c r4:85177800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85177b8c r4:852b8a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223c00 r8:852b8a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8a00 r8:8027f5e8 r7:eacd9e60 r6:85263e80 r5:85223c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c22c0 INFO: task kworker/0:439:4302 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b7f86000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:4304 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacddd84 r8:00000002 r7:60000013 r6:eacddd8c r5:84d36c00 r4:84d36c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d36c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d36c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517838c r4:85178000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517838c r4:852b8a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d36c00 r8:852b8aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8a80 r8:8027f5e8 r7:eace5e60 r6:852b8b00 r5:84d36c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2440 INFO: task kworker/0:440:4304 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b82f5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4305 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacbdd84 r8:00000002 r7:60000113 r6:eacbdd8c r5:84d34800 r4:84d34800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d34800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d34800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177f8c r4:85177c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85177f8c r4:852b8b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d34800 r8:852b8bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8b80 r8:8027f5e8 r7:eacdde60 r6:852b8c00 r5:84d34800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2440 INFO: task kworker/0:441:4305 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b85de000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:4308 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eace9d84 r8:00000002 r7:60000013 r6:eace9d8c r5:84d33c00 r4:84d33c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d33c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d33c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517878c r4:85178400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517878c r4:852b8c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d33c00 r8:852b8cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8c80 r8:8027f5e8 r7:eacdde60 r6:852b8d00 r5:84d33c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace9fb0 to 0xeace9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2740 INFO: task kworker/0:442:4308 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b85de000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4310 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:84d30c00 r4:84d30c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d30c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c29c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d30c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85178b8c r4:85178800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85178b8c r4:852b8e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d30c00 r8:852b8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8e00 r8:8027f5e8 r7:eace9e60 r6:852b8e80 r5:84d30c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf1fb0 to 0xeacf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2840 INFO: task kworker/0:443:4310 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b8a73000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4312 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:84d32400 r4:84d32400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d32400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d32400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85178f8c r4:85178c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85178f8c r4:852b8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d32400 r8:852b8dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8d80 r8:8027f5e8 r7:eacf1e60 r6:852b8f00 r5:84d32400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2c00 INFO: task kworker/0:444:4312 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b8a73000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fab300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:445:4314 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:84cb8000 r4:84cb8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517938c r4:85179000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517938c r4:852b8f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb8000 r8:852b8fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8f80 r8:8027f5e8 r7:eacf5e60 r6:852d4000 r5:84cb8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2ac0 INFO: task kworker/0:445:4314 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b8a73000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4317 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacfdd84 r8:00000002 r7:60000113 r6:eacfdd8c r5:84cb8c00 r4:84cb8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacfde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bbfc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517978c r4:85179400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517978c r4:852d4080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb8c00 r8:852d40ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d4080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4080 r8:8027f5e8 r7:eacf9e60 r6:852d4100 r5:84cb8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bb300 INFO: task kworker/0:446:4317 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b8ee7000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4318 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:84cba400 r4:84cba400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cba400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cba400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85179b8c r4:85179800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85179b8c r4:852d4180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cba400 r8:852d41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d4180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4180 r8:8027f5e8 r7:eacfde60 r6:852d4200 r5:84cba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d90c0 INFO: task kworker/0:447:4318 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b8ee7000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4320 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:84cbb000 r4:84cbb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cbb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cbb000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517ab8c r4:8517a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517ab8c r4:852d4280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cbb000 r8:852d42ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d4280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4280 r8:8027f5e8 r7:ead01e60 r6:852d4300 r5:84cbb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacedfb0 to 0xeacedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d90c0 INFO: task kworker/0:448:4320 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b9520000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4322 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead09d84 r8:00000002 r7:60000113 r6:ead09d8c r5:84cb9800 r4:84cb9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d92c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb9800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: b9520000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4323 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:84cbd400 r4:84cbd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cbd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaaf7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8517a78c r4:852d4480 r10:00000000 r9:852d4480 r8:8027f5e8 r7:eacede60 r6:852d4500 r5:84cbd400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:e04e9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:4326 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead19d84 r8:00000002 r7:60000113 r6:ead19d8c r5:84cbe000 r4:84cbe000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cbe000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537c140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cbe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d45f8c r4:85263f00 r4:852c95c0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:84cbec00 r4:84cbec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cbec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524c400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cbec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4678c r4:84d46400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4678c r4:85263f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cbec00 r8:85263fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85263f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85263f80 r8:8027f5e8 r7:ead19e60 r6:852d4600 r5:84cbec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c95c0 INFO: task kworker/1:152:4328 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d20: b9e11000 eca73000 00000001 80239b98 7f185000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4330 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:84cbc800 r4:84cbc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cbc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2e80 r5:00001000 r4:eab2f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517b38c r4:852d4680 r10:00000000 r9:852d4680 r8:8027f5e8 r7:eacede60 r6:852d4700 r5:84cbc800 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r5:00001000 r4:dfe9b000 r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84c78c00 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537c000 r5:00001000 r4:eabf1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab21000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:852d4800 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4337 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead25d84 r8:00000002 r7:60000013 r6:ead25d8c r5:84c78000 r4:84c78000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c78000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c78000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab39000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517b78c r4:8517b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517b78c r4:852d4900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c78000 r8:852d492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d4900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4900 r8:8027f5e8 r7:ead21e60 r6:852d4980 r5:84c78000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d9600 INFO: task kworker/0:453:4337 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eab4f000 r7:dddced80 r6:83018000 r5:8517bb8c r4:852d4a00 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4340 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead0dd84 r8:00000002 r7:60000013 r6:ead0dd8c r5:84c7bc00 r4:84c7bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eab59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8517bf8c r4:852d4b00 Exception stack(0xead0dfb0 to 0xead0dff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84c7c800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfbad000 r7:dddced80 r6:83018000 r5:8532878c r4:852d4c00 r4:00000001 Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852de240 INFO: task kworker/0:456:4342 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bacae000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:4344 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4344 tgid:4344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab89d84 r8:00000002 r7:60000013 r6:eab89d8c r5:84c7d400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de3c0 r5:00001000 r4:df9e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8532838c r4:852d4d00 9fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfc79000 r7:dddced80 r6:83018000 r5:85328b8c r4:852d4e00 Exception stack(0xeabb1fb0 to 0xeabb1ff8) r4:852de480 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4348 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:84c7ec00 r4:84c7ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:e0119000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8532978c r4:852d4f00 r10:00000000 r9:852d4f00 r8:8027f5e8 r7:eabb1e60 r6:852d4f80 r5:84c7ec00 Workqueue: events bpf_prog_free_deferred 9d20: bb571000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:84c79800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de8c0 r5:00001000 r4:dffa9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead35d84 r8:00000002 r7:60000113 r6:ead35d8c r5:84cbbc00 r4:84cbbc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cbbc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cbbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0039000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532938c r4:85329000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532938c r4:852e2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cbbc00 r8:852e212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2100 r8:8027f5e8 r7:eab99e60 r6:852e2180 r5:84cbbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852deb40 INFO: task kworker/0:461:4351 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bc384000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84faa100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85329b8c r4:85329800 r4:852e2200 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c9f80 r5:00001000 r4:e0691000 r7:dddced80 r6:83018000 r5:85329f8c r4:852e2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:852e232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2300 r8:8027f5e8 r7:ead3de60 r6:852dc080 r5:852ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852dedc0 INFO: task kworker/0:463:4356 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bcdae000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e06f5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852c94c0 Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84faa100 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e079b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c94c0 INFO: task kworker/0:465:4360 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bcdae000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:4362 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:4362 tgid:4362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8532ab8c r4:852e2480 r10:00000000 r9:852e2480 r8:8027f5e8 r7:ead51e60 r6:852dc200 r5:852ed400 Workqueue: events bpf_prog_free_deferred 9d20: bda59000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532af8c r4:8532ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532af8c r4:852e2500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ee000 r8:852e252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2500 r8:8027f5e8 r7:ead59e60 r6:852dc280 r5:852ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362280 INFO: task kworker/0:467:4364 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bda59000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ea6b8c r4:84ea6800 Exception stack(0xe04e9fb0 to 0xe04e9ff8) task:kworker/0:468 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e081f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532b38c r4:8532b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532b38c r4:852e2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eb000 r8:852e25ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2580 r8:8027f5e8 r7:ead5de60 r6:852dc300 r5:852eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 INFO: task kworker/0:469:4368 blocked for more than 459 seconds. r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8532b78c r4:852e2600 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4370 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:852e8c00 r4:852e8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362800 r5:00001000 r4:e8905000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8532bf8c r4:8532bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8c00 r8:852e26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2680 r8:8027f5e8 r7:ead6de60 r6:852dc400 r5:852e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362500 INFO: task kworker/0:470:4370 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: be40a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 task:kworker/0:471 state:D stack:0 pid:4371 tgid:4371 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e48db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8532bb8c r4:8532b800 r7:dddced80 r6:83018000 r5:8532bb8c r4:852e2700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e9800 r8:852e272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2700 r8:8027f5e8 r7:ead71e60 r6:852dc480 r5:852e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362680 INFO: task kworker/0:471:4371 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:00001000 r4:e897b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: bead0000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 task:kworker/0:473 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8923000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533038c r4:85330000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533038c r4:852e2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522e000 r8:852e282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2800 r8:8027f5e8 r7:ead79e60 r6:852dc580 r5:8522e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362840 INFO: task kworker/0:473:4375 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bead0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:4377 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea99d000 r5:85330b8c r4:85330800 r10:61c88647 r9:852f0000 r8:852e28ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4379 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead8dd84 r8:00000002 r7:60000013 r6:ead8dd8c r5:852f1800 r4:852f1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab67000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533178c r4:85331400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533178c r4:852e2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f1800 r8:852e292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2900 r8:8027f5e8 r7:ead85e60 r6:852dc680 r5:852f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:84ea6b8c r4:84ea6800 r4:84fab300 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:852f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:852e2980 r8:8027f5e8 r7:ead8de60 r6:852dc700 r5:852f0c00 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: bf6b6000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4383 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead9dd84 r8:00000002 r7:60000013 r6:ead9dd8c r5:852f2400 r4:852f2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362e40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533138c r4:85331000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533138c r4:852e2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f2400 r8:852e2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2a00 r8:8027f5e8 r7:ead8de60 r6:852dc780 r5:852f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead9dfb0 to 0xead9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362d40 INFO: task kworker/0:477:4383 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf952000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:478:4386 blocked for more than 459 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:851dbc00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eabbb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bfb8f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4388 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4388 tgid:4388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eada5d84 r8:00000002 r7:60000113 r6:eada5d8c r5:851dc800 r4:851dc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853731c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab71000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85331b8c r4:85331800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85331b8c r4:852e2b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dc800 r8:852e2bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2b80 r8:8027f5e8 r7:ead65e60 r6:852e2c00 r5:851dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373180 INFO: task kworker/0:479:4388 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bff0b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4389 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:851de000 r4:851de000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851de000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851de000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85331f8c r4:85331c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85331f8c r4:852e2c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851de000 r8:852e2cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2c80 r8:8027f5e8 r7:ead65e60 r6:852e2d00 r5:851de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead41fb0 to 0xead41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373280 INFO: task kworker/0:480:4389 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0147000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4391 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadadd84 r8:00000002 r7:60000013 r6:eadadd8c r5:851dec00 r4:851dec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533238c r4:85332000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533238c r4:852e2d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dec00 r8:852e2dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2d80 r8:8027f5e8 r7:ead65e60 r6:852e2e00 r5:851dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadadfb0 to 0xeadadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373280 INFO: task kworker/0:481:4391 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c05a5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4394 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4394 tgid:4394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadb5d84 r8:00000002 r7:60000013 r6:eadb5d8c r5:851db000 r4:851db000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851db000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851db000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85332f8c r4:85332c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85332f8c r4:852e2e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851db000 r8:852e2eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2e80 r8:8027f5e8 r7:ead65e60 r6:852e2f00 r5:851db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb5fb0 to 0xeadb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373600 INFO: task kworker/0:482:4394 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0adc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 task:kworker/0:483 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eada9d84 r8:00000002 r7:60000113 r6:eada9d8c r5:852f4800 r4:852f4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853739c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85332b8c r4:85332800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85332b8c r4:852e2f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f4800 r8:852e2fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852e2f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e2f80 r8:8027f5e8 r7:eadb5e60 r6:852dc800 r5:852f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373940 INFO: task kworker/0:483:4397 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0adc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:4399 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:852f3000 r4:852f3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1080 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533ef8c r4:8533ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ef8c r4:852dc880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3000 r8:852dc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852dc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc880 r8:8027f5e8 r7:ead19e60 r6:852dc900 r5:852f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8537c280 INFO: task kworker/1:154:4399 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0adc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4402 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadb9d84 r8:00000002 r7:60000113 r6:eadb9d8c r5:852f5400 r4:852f5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533338c r4:85333000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533338c r4:85372000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f5400 r8:8537202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372000 r8:8027f5e8 r7:eadb5e60 r6:852dc980 r5:852f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373c40 INFO: task kworker/0:484:4402 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0f84000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:4404 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadc1d84 r8:00000002 r7:60000113 r6:eadc1d8c r5:852f6000 r4:852f6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537cb40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d46f8c r4:84d46c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d46f8c r4:852dca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6000 r8:852dca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852dca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dca00 r8:8027f5e8 r7:eadb1e60 r6:852dca80 r5:852f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc1fb0 to 0xeadc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8537c080 INFO: task kworker/1:155:4404 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c1175000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4405 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:852f6c00 r4:852f6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373f40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac31000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533378c r4:85333400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533378c r4:85372080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6c00 r8:853720ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372080 r8:8027f5e8 r7:eadb9e60 r6:852dcb00 r5:852f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373d80 INFO: task kworker/0:485:4405 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c13ac000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4407 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadd5d84 r8:00000002 r7:60000013 r6:eadd5d8c r5:852f8000 r4:852f8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85333b8c r4:85333800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85333b8c r4:85372100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f8000 r8:8537212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372100 r8:8027f5e8 r7:eadc5e60 r6:852dcb80 r5:852f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362e80 INFO: task kworker/0:486:4407 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c13ac000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:4409 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadddd84 r8:00000002 r7:60000013 r6:eadddd8c r5:852f9800 r4:852f9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85333f8c r4:85333c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85333f8c r4:85372180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f9800 r8:853721ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeadddfb0 to 0xeadddff8) r4:85376000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4411 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eade5d84 r8:00000002 r7:60000013 r6:eade5d8c r5:852f8c00 r4:852f8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533878c r4:85338400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533878c r4:85372200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f8c00 r8:8537222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372200 r8:8027f5e8 r7:eaddde60 r6:852dcc80 r5:852f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853762c0 INFO: task kworker/0:488:4411 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c1995000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:84fab300 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:489 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r5:00001000 r4:eac7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852fbc00 r8:853722ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853762c0 INFO: task kworker/0:489:4413 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c1d42000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:490 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:852fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r5:00001000 r4:df9ff000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85372300 r8:8027f5e8 r7:eade5e60 r6:852dcd80 r5:852fa400 r4:85376140 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c1e35000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:491 state:D stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376400 r5:00001000 r4:eadf5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85338b8c r4:85338800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852fd400 r8:853723ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeae09fb0 to 0xeae09ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:4418 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:4418 tgid:4418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:852fc800 r4:852fc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85339f8c r4:85339c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fc800 r8:8537242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372400 r8:8027f5e8 r7:eadfde60 r6:852dce80 r5:852fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853766c0 INFO: task kworker/0:492:4418 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2751000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:852fe000 r5:852fe000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfab1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8533978c r4:85372480 r4:85372480 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85376640 INFO: task kworker/0:493:4421 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2ddc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:852fb000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376980 r5:00001000 r4:e00b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:85339b8c r4:85372500 r4:85372500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2ddc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:4426 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae35d84 r8:00000002 r7:60000113 r6:eae35d8c r5:85300000 r4:85300000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85300000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85300000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac45000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d45b8c r4:84d45800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d45b8c r4:85388180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85300000 r8:853881ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388180 r8:8027f5e8 r7:eadb1e60 r6:85388200 r5:85300000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8537c800 INFO: task kworker/1:156:4426 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2ddc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:4428 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:85301800 r4:85301800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85301800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376b80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533a38c r4:8533a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533a38c r4:85372580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85301800 r8:853725ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372580 r8:8027f5e8 r7:eae1de60 r6:85388280 r5:85301800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85376900 INFO: task kworker/0:495:4428 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3591000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4429 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae41d84 r8:00000002 r7:60000013 r6:eae41d8c r5:85302400 r4:85302400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85302400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376e00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85302400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533ab8c r4:8533a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533ab8c r4:85372600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85302400 r8:8537262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372600 r8:8027f5e8 r7:eae3de60 r6:85388300 r5:85302400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae41fb0 to 0xeae41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85376900 INFO: task kworker/0:496:4429 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3591000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4431 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae49d84 r8:00000002 r7:60000013 r6:eae49d8c r5:85300c00 r4:85300c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85300c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85300c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533a78c r4:8533a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533a78c r4:85372680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85300c00 r8:853726ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372680 r8:8027f5e8 r7:eae41e60 r6:85388380 r5:85300c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85376bc0 INFO: task kworker/0:497:4431 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3591000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:4433 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:4433 tgid:4433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:85303000 r4:85303000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376f00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85303000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533b38c r4:8533b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533b38c r4:85372700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85303000 r8:8537272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372700 r8:8027f5e8 r7:eae41e60 r6:85388400 r5:85303000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85376d00 INFO: task kworker/0:498:4433 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3591000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:4435 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae7dd84 r8:00000002 r7:60000113 r6:eae7dd8c r5:85304800 r4:85304800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85304800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537cec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85304800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533af8c r4:8533ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533af8c r4:85372780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85304800 r8:853727ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372780 r8:8027f5e8 r7:eae79e60 r6:85388480 r5:85304800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8537cd00 INFO: task kworker/0:499:4435 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3a91000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4437 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:85306000 r4:85306000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533bf8c r4:8533bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533bf8c r4:85372800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85306000 r8:8537282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372800 r8:8027f5e8 r7:eae79e60 r6:85388500 r5:85306000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8537cd00 INFO: task kworker/0:500:4437 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3a91000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:4439 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:85305400 r4:85305400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85305400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533b78c r4:8533b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533b78c r4:85372880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85305400 r8:853728ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372880 r8:8027f5e8 r7:eaea1e60 r6:85388580 r5:85305400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85376500 INFO: task kworker/0:501:4439 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4091000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4442 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaec1d84 r8:00000002 r7:60000113 r6:eaec1d8c r5:85306c00 r4:85306c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85373e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533bb8c r4:8533b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533bb8c r4:85372900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85306c00 r8:8537292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372900 r8:8027f5e8 r7:eaea1e60 r6:85388600 r5:85306c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec1fb0 to 0xeaec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85373b00 INFO: task kworker/0:502:4442 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4091000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:4444 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaecdd84 r8:00000002 r7:60000013 r6:eaecdd8c r5:852fec00 r4:852fec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533df8c r4:8533dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533df8c r4:85372980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fec00 r8:853729ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372980 r8:8027f5e8 r7:eaea1e60 r6:85388680 r5:852fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85397080 INFO: task kworker/0:503:4444 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c491b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4445 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:852f3c00 r4:852f3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533c38c r4:8533c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533c38c r4:85372a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3c00 r8:85372a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372a00 r8:8027f5e8 r7:eaecde60 r6:85388700 r5:852f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85397080 INFO: task kworker/0:504:4445 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c491b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4447 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaed9d84 r8:00000002 r7:60000013 r6:eaed9d8c r5:85308c00 r4:85308c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853972c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533c78c r4:8533c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533c78c r4:85372a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308c00 r8:85372aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372a80 r8:8027f5e8 r7:eaecde60 r6:85388780 r5:85308c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed9fb0 to 0xeaed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853971c0 INFO: task kworker/0:505:4447 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4e08000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4449 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaee1d84 r8:00000002 r7:60000113 r6:eaee1d8c r5:85308000 r4:85308000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533cb8c r4:8533c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533cb8c r4:85372b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:85372b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372b00 r8:8027f5e8 r7:eaecde60 r6:85388800 r5:85308000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85397300 INFO: task kworker/0:506:4449 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4e08000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:4451 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaee9d84 r8:00000002 r7:60000013 r6:eaee9d8c r5:85309800 r4:85309800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85309800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85309800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533cf8c r4:8533cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533cf8c r4:85372b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85309800 r8:85372bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372b80 r8:8027f5e8 r7:eaecde60 r6:85388880 r5:85309800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853973c0 INFO: task kworker/0:507:4451 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4e08000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4454 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:8530a400 r4:8530a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533d38c r4:8533d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533d38c r4:85372c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530a400 r8:85372c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372c00 r8:8027f5e8 r7:eaecde60 r6:85388900 r5:8530a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853977c0 INFO: task kworker/0:508:4454 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c53be000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r5:00001000 r4:eaaf1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8533d78c r4:85372c80 Exception stack(0xeaef9fb0 to 0xeaef9ff8) r4:85397600 Call trace: 9d20: c5828000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4457 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4457 tgid:4457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae55d84 r8:00000002 r7:60000113 r6:eae55d8c r5:851d9800 r4:851d9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853978c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533db8c r4:8533d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533db8c r4:85372d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d9800 r8:85372d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372d00 r8:8027f5e8 r7:eaecde60 r6:85372d80 r5:851d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85397740 INFO: task kworker/0:510:4457 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 r4:00000001 r4:84faa100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab31000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533e38c r4:8533e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533e38c r4:85372e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d8000 r8:85372e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85372e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85372e00 r8:8027f5e8 r7:eaecde60 r6:85372e80 r5:851d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85397d00 INFO: task kworker/0:511:4460 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c5c49000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851da400 r4:8291892c r4:00000000 r9:83018005 r8:851da400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851da400 r8:85372f2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851dd400 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eab5f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533eb8c r4:8533e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533eb8c r4:852dcf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dd400 r8:852dcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dcf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dcf80 r8:8027f5e8 r7:eaf01e60 r6:853ae000 r5:851dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85397b80 INFO: task kworker/0:513:4463 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c6713000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4465 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf0dd84 r8:00000002 r7:60000113 r6:eaf0dd8c r5:84c68000 r4:84c68000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c68000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c68000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533fb8c r4:8533f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533fb8c r4:853ae080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c68000 r8:853ae0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ae080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae080 r8:8027f5e8 r7:eaf05e60 r6:853ae100 r5:84c68000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacb5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84c6a400 r8:85388a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:4471 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84c6b000 r4:84c6b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529ff8c r4:8529fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529ff8c r4:85388a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6b000 r8:85388aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388a80 r8:8027f5e8 r7:eaf15e60 r6:853ae200 r5:84c6b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538fe80 INFO: task kworker/1:158:4471 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c6d4f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 task:kworker/0:515 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf21d84 r8:00000002 r7:60000113 r6:eaf21d8c r5:84c6bc00 r4:84c6bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533f78c r4:8533f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533f78c r4:853ae280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6bc00 r8:853ae2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ae280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae280 r8:8027f5e8 r7:eaf0de60 r6:853ae300 r5:84c6bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1440 INFO: task kworker/0:515:4472 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c6d4f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:159 state:D stack:0 pid:4473 tgid:4473 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:84c6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:00001000 r4:eacdf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c6d4f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84c6d400 r8:85388bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ad000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfc07000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529cf8c r4:8529cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cf8c r4:85388c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530bc00 r8:85388c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388c00 r8:8027f5e8 r7:eaf1de60 r6:85388c80 r5:8530bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad140 INFO: task kworker/1:161:4477 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c73ae000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:4481 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:8530c800 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae6d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8530c800 r8:853ae4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853b1bc0 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4483 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:8530d400 r4:8530d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf49000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85340b8c r4:85340800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85340b8c r4:853ae500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530d400 r8:853ae52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ae500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae500 r8:8027f5e8 r7:eaf3de60 r6:85388d80 r5:8530d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853b1c40 Call trace: 9d20: c7b11000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84c70000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae83000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84c70000 r8:853ae5ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r5:80070013 r4:80239bb0 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:4486 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:84c69800 r4:84c69800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c69800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1f40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c69800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534078c r4:85340400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534078c r4:853ae600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c69800 r8:853ae62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ae600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae600 r8:8027f5e8 r7:eaf45e60 r6:853ae680 r5:84c69800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1d80 INFO: task kworker/0:519:4486 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e04e9dc0 r5:00001000 r4:dfe9b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:520 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r5:00001000 r4:eaf61000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8534138c r4:853ae700 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c80b6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4489 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84c6ec00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 Call trace: r5:85228000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dff21000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529d38c r4:8529d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529d38c r4:85388e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228000 r8:85388eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388e80 r8:8027f5e8 r7:eaf1de60 r6:853ae900 r5:85228000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ada40 INFO: task kworker/1:162:4494 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c82d4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fab300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:84cd0000 r4:84cd0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853add80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529d78c r4:8529d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529d78c r4:85388f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd0000 r8:85388fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388f80 r8:8027f5e8 r7:eaf1de60 r6:853ae980 r5:84cd0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853adec0 INFO: task kworker/1:163:4496 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85341b8c r4:85341800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85341b8c r4:853aea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd0c00 r8:853aea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853aea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853aea00 r8:8027f5e8 r7:eaf41e60 r6:853aea80 r5:84cd0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b4380 INFO: task kworker/0:522:4497 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c8766000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8534178c r4:853aeb00 Exception stack(0xeaf81fb0 to 0xeaf81ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c8955000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:4500 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:84cd2400 r4:84cd2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ade40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0151000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529db8c r4:8529d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529db8c r4:85388f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd2400 r8:85388f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388f00 r8:8027f5e8 r7:eaf1de60 r6:853aec00 r5:84cd2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf85fb0 to 0xeaf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853adf40 INFO: task kworker/1:164:4500 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c8c27000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:165:4502 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:165 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:84cd3c00 r4:84cd3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853adf80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529df8c r4:8529dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529df8c r4:85388000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd3c00 r8:8538802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85388000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85388000 r8:8027f5e8 r7:eaf1de60 r6:853aec80 r5:84cd3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad900 INFO: task kworker/1:165:4502 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad8c0 INFO: task kworker/1:166:4504 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c92c3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:4506 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:4506 tgid:4506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf9dd84 r8:00000002 r7:60000113 r6:eaf9dd8c r5:84cd4800 r4:84cd4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd4800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529e78c r4:8529e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529e78c r4:853b6000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd4800 r8:853b602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6000 r8:8027f5e8 r7:eaf1de60 r6:853aed80 r5:84cd4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d20: c949e000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:84cd5400 r4:84cd5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd5400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0805000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529eb8c r4:8529e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529eb8c r4:853b6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd5400 r8:853b60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6080 r8:8027f5e8 r7:eaf1de60 r6:853aee00 r5:84cd5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736740 INFO: task kworker/1:168:4508 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/1:169:4510 blocked for more than 460 seconds. r10:82918930 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:84cd6000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e48c5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeafadfb0 to 0xeafadff8) r4:853a8000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:4512 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:853e0c00 r4:853e0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529f38c r4:8529f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529f38c r4:853b6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0c00 r8:853b61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6180 r8:8027f5e8 r7:eaf1de60 r6:853aef00 r5:853e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e04e9dc0 r5:00001000 r4:dfe9b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:84faa100 task:kworker/1:171 state:D stack:0 pid:4514 tgid:4514 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r5:00001000 r4:e8937000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:853a82c0 Call trace: 9d20: c9c41000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:172:4516 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:172 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:84c71800 r4:84c71800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c71800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a84c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c71800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea995000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529fb8c r4:8529f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529fb8c r4:853b6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c71800 r8:853b62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6280 r8:8027f5e8 r7:eaf1de60 r6:853b6300 r5:84c71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf59fb0 to 0xeaf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8380 INFO: task kworker/1:172:4516 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ca0dc000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:84c74800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c74800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c74800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4738c r4:84d47000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4738c r4:853b6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c74800 r8:853b63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6380 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:84c73000 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:4524 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:4524 tgid:4524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:853e1800 r4:853e1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab77000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a038c r4:852a0000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a038c r4:853b6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e1800 r8:853b65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeafcdfb0 to 0xeafcdff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04e9dc0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafd1d84 r8:00000002 r7:60000013 r6:eafd1d8c r5:853e3c00 r4:853e3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a078c r4:852a0400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a078c r4:853b6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3c00 r8:853b662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6600 r8:8027f5e8 r7:eafc1e60 r6:85399080 r5:853e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8ac0 INFO: task kworker/1:176:4525 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ca8f1000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eafd5d84 r8:00000002 r7:60000013 r6:eafd5d8c r5:853e4800 r4:00000000 r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:00001000 r4:eabb3000 r7:ddde2d80 r6:83018200 r5:852a0b8c r4:853b6680 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:84ea6b8c r4:84ea6800 r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eafc5d84 r8:00000002 r7:60000013 r6:eafc5d8c r5:853e5400 r4:00000000 r9:83018205 r8:853e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac77000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1f8c r4:852a1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a1f8c r4:853b6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e5400 r8:853b672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6700 r8:8027f5e8 r7:eafc1e60 r6:85399180 r5:853e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8dc0 INFO: task kworker/1:178:4530 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cafa5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eafd9d84 r8:00000002 r7:60000013 r6:eafd9d8c r5:853e6000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eac07000 r5:852a138c r4:852a1000 r10:61c88647 r9:853e6000 r8:853b67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:e04e9dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 r4:853e6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r5:00001000 r4:eac21000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a178c r4:852a1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a178c r4:853b6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6c00 r8:853b682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6800 r8:8027f5e8 r7:eafc5e60 r6:85399280 r5:853e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539c000 INFO: task kworker/1:180:4533 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cb3a2000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4536 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:84cd6c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:852a1b8c r4:853b6880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc8000 r8:853b68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6880 r8:8027f5e8 r7:eafc5e60 r6:85399400 r5:84cc8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539c140 INFO: task kworker/1:181:4537 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cb976000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:4539 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:84cc8c00 r4:84cc8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r9:83018205 r8:84cc8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:00001000 r4:ead37000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853b6900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r5:80070013 r4:80239bb0 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cc9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r5:00001000 r4:ead99000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853b6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6980 r8:8027f5e8 r7:eaff1e60 r6:85399500 r5:84cc9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539c440 INFO: task kworker/1:183:4541 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cbd81000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:4543 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:4543 tgid:4543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafe1d84 r8:00000002 r7:60000013 r6:eafe1d8c r5:84c76c00 r4:84c76c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c76c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539c600 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: cbdf1000 eca73000 00000001 80239b98 7f185000 00000001 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:4545 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaff9d84 r8:00000002 r7:60000113 r6:eaff9d8c r5:84c76000 r4:84c76000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c76000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539c880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c76000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a2b8c r4:852a2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a2b8c r4:853b6b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c76000 r8:853b6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6b00 r8:8027f5e8 r7:eaff5e60 r6:853b6b80 r5:84c76000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff9fb0 to 0xeaff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539c340 INFO: task kworker/1:185:4545 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:84c73c00 r4:84c73c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c73c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85392a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85341f8c r4:85341c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85341f8c r4:85399580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c73c00 r8:853995ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85399580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399580 r8:8027f5e8 r7:eafe9e60 r6:853b6c00 r5:84c73c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85392500 INFO: task kworker/0:525:4546 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cc00c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/1:186:4548 blocked for more than 461 seconds. r4:84c72400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeafe5fb0 to 0xeafe5ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:4551 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:84c70c00 r4:84c70c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c70c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ce00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3b8c r4:852a3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a3b8c r4:853b6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c70c00 r8:853b6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84c75400 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eadc7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4557 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:85303c00 r4:85303c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85392b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85303c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0519000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534238c r4:85342000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cca2a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8530e000 r8:8539802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85392fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85310000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85342f8c r4:85342c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85342f8c r4:85399680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85310000 r8:853996ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85399680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399680 r8:8027f5e8 r7:eafe9e60 r6:85398100 r5:85310000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85392ac0 INFO: task kworker/0:527:4560 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cd01f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:85311800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r5:00001000 r4:e0753000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85311800 r8:853997ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/1:190:4565 blocked for more than 461 seconds. r4:85312400 r4:00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85312400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab51000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3f8c r4:852a3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a3f8c r4:85398200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85312400 r8:8539822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85398200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85398200 r8:8027f5e8 r7:eae0de60 r6:85398280 r5:85312400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539d300 INFO: task kworker/1:190:4565 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cd602000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 r4:85313000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa35000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85313c00 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa89000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85343b8c r4:85343800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85343b8c r4:85399800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313c00 r8:8539982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85399800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399800 r8:8027f5e8 r7:eaf19e60 r6:85398380 r5:85313c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85392d40 INFO: task kworker/0:530:4568 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cdbc3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4569 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85314800 r4:00000000 r5:00001000 r4:eaa4f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85399880 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r5:00001000 r4:eaab3000 r5:85343f8c r4:85343c00 r10:61c88647 r9:85315400 r8:8539992c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ce10b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4573 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb00dd84 r8:00000002 r7:60000013 r6:eb00dd8c r5:85316000 r4:85316000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85316000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538d340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85316000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r5:00001000 r4:eaad7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85399980 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:85316c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r5:00001000 r4:eaaef000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316c00 r8:85399a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85399a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399a00 r8:8027f5e8 r7:eb00de60 r6:85399a80 r5:85316c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538d0c0 INFO: task kworker/0:534:4576 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ce61a000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:84cca400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r5:00001000 r4:eab11000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4580 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb011d84 r8:00000002 r7:60000013 r6:eb011d8c r5:84ccd400 r4:84ccd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ccd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538db40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ccd400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535138c r4:85351000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535138c r4:85399c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ccd400 r8:85399c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85399c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399c00 r8:8027f5e8 r7:eaedde60 r6:85399c80 r5:84ccd400 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:537:4581 blocked for more than 461 seconds. r4:84ccbc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r5:00001000 r4:eab29000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: ceb55000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4585 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:84cce000 r4:84cce000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cce000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cce000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85351f8c r4:85351c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85351f8c r4:85399e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cce000 r8:85399e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85399e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399e00 r8:8027f5e8 r7:eb011e60 r6:85399e80 r5:84cce000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:84ccec00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaca1000 r5:8535178c r4:85351400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/0:540 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb025d84 r8:00000002 r7:60000013 r6:eb025d8c r5:853e0000 r4:853e0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538da40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85351b8c r4:85351800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85351b8c r4:8538a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0000 r8:8538a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a000 r8:8027f5e8 r7:eb01de60 r6:8538a080 r5:853e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538df80 INFO: task kworker/0:540:4589 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cf63b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eadeb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4593 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb02dd84 r8:00000002 r7:60000013 r6:eb02dd8c r5:84ce0000 r4:84ce0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce0000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535278c r4:85352400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535278c r4:8538a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce0000 r8:8538a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a200 r8:8027f5e8 r7:eb029e60 r6:8538a280 r5:84ce0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538b240 INFO: task kworker/0:542:4593 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ce1800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae31000 r5:85352f8c r4:85352c00 r10:61c88647 r9:84ce1800 r8:8538a32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e04e9dc0 r5:84ea6b8c r4:84ea6800 r4:84fab300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4596 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb021d84 r8:00000002 r7:60000013 r6:eb021d8c r5:84ce2400 r4:84ce2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85352b8c r4:85352800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85352b8c r4:8538a400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce2400 r8:8538a42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a400 r8:8027f5e8 r7:eb031e60 r6:8538a480 r5:84ce2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538b800 INFO: task kworker/0:544:4596 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: cff55000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545438c r4:85454000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545438c r4:8538a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce3c00 r8:8538a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a500 r8:8027f5e8 r7:eb031e60 r6:8538a580 r5:84ce3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d051b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:84ce3000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae93000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8541c38c r4:8541c000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8539d840 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb045d84 r8:00000002 r7:60000013 r6:eb045d8c r5:84ce4800 r4:84ce4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538bc80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce4800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535338c r4:85353000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535338c r4:8538a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce4800 r8:8538a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a680 r8:8027f5e8 r7:eb03de60 r6:8538a700 r5:84ce4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538bac0 INFO: task kworker/0:546:4601 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d05b3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:84faa100 Call trace: r5:84ce6000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae57000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8538bd00 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:85310c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85310c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85310c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85353b8c r4:85353800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85353b8c r4:8538a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85310c00 r8:8538a8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a880 r8:8027f5e8 r7:eb03de60 r6:85398600 r5:85310c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538bd00 INFO: task kworker/0:548:4605 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d0de5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85353f8c r4:85353c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85353f8c r4:8538a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530ec00 r8:8538a92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538a900 r8:8027f5e8 r7:eb03de60 r6:85398680 r5:8530ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538bdc0 Workqueue: events bpf_prog_free_deferred 9d20: d0f53000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d1267000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:193:4610 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:85318000 r4:85318000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85318000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ddc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85318000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541cb8c r4:8541c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cb8c r4:85398800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318000 r8:8539882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85398800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85398800 r8:8027f5e8 r7:eae0de60 r6:85398880 r5:85318000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539db80 INFO: task kworker/1:193:4610 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d1267000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85318c00 r8:8539892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: d17a6000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfa5b000 r5:8545478c r4:85454400 r10:61c88647 r9:85319800 r8:8538a9ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85382000 INFO: task kworker/0:550:4615 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d1beb000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4618 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb065d84 r8:00000002 r7:60000013 r6:eb065d8c r5:8531a400 r4:8531a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531a400 r4:8291892c [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfceb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85454b8c r4:8538aa00 Exception stack(0xeb065fb0 to 0xeb065ff8) r4:853823c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:8531c800 r4:8531c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545678c r4:85456400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545678c r4:8538aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531c800 r8:8538aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538aa80 r8:8027f5e8 r7:eb065e60 r6:85398b00 r5:8531c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85382680 INFO: task kworker/0:552:4620 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:553 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382580 r5:00001000 r4:e00f1000 r7:dddced80 r6:83018000 r5:85454f8c r4:8538ab00 dfa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab300 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:554 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0669000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545538c r4:85455000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545538c r4:8538ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531bc00 r8:8538abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538ab80 r8:8027f5e8 r7:eb069e60 r6:85398c00 r5:8531bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85382500 INFO: task kworker/0:554:4623 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d2102000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4626 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:8531ec00 r4:8531ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545578c r4:8538ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531ec00 r8:8538ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538ac00 r8:8027f5e8 r7:eb069e60 r6:85398c80 r5:8531ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85382880 INFO: task kworker/0:555:4626 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d2102000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:4627 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8531d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 r5:00001000 r4:e8921000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:558 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85382e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cd8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaaf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85456b8c r4:85456800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85456b8c r4:8538ae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd8c00 r8:8538ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538ae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538ae00 r8:8027f5e8 r7:eb069e60 r6:85398e00 r5:84cd8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85382c40 INFO: task kworker/0:558:4632 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d2a5c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84faa100 Workqueue: events bpf_prog_free_deferred r5:84cd9800 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:eabe5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) task:kworker/0:560 state:D stack:0 pid:4636 tgid:4636 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eab79000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85456f8c r4:8538ae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdbc00 r8:8538aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538ae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538ae80 r8:8027f5e8 r7:eb099e60 r6:85398f00 r5:84cdbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85382d80 INFO: task kworker/0:560:4636 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d2c1f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4638 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84cdb000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaba5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: d30ba000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:562:4640 blocked for more than 462 seconds. [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b51c0 r5:00001000 r4:eac01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457b8c r4:85457800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85457b8c r4:8538af80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdc800 r8:8538afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538af80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538af80 r8:8027f5e8 r7:eb099e60 r6:853b0000 r5:84cdc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8539d1c0 INFO: task kworker/0:562:4640 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d30ba000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fab300 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:563 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eac2f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457f8c r4:85457c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85457f8c r4:853a9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdd400 r8:853a902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9000 r8:8027f5e8 r7:eb0ade60 r6:853b0080 r5:84cdd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b5240 INFO: task kworker/0:563:4643 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d3417000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:4645 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:84cde000 r4:84cde000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cde000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b53c0 r4:00000000 r9:83018005 r8:84cde000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:00001000 r4:ead39000 r5:8545838c r4:85458000 r4:853a9080 Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:565:4646 blocked for more than 462 seconds. [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b5680 r5:00001000 r4:ead87000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:4651 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0c5d84 r8:00000002 r7:60000113 r6:eb0c5d8c r5:85488000 r4:85488000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85488000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b5500 r5:00001000 r4:ead55000 r5:8545878c r4:85458400 Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0c9d84 r8:00000002 r7:60000013 r6:eb0c9d8c r5:85488c00 r4:85488c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85488c00 r4:8291892c [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85458f8c r4:85458c00 r10:61c88647 r9:85488c00 r8:853a922c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b5880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548a400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545938c r4:85459000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545938c r4:853a9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548a400 r8:853a92ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9280 r8:8027f5e8 r7:eb0c9e60 r6:853b0300 r5:8548a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b5a40 INFO: task kworker/0:568:4654 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d3d9f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4655 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:8548b000 r4:8548b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:eaf53000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: d40ff000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b5a80 r5:00001000 r4:eaed3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545978c r4:85459400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545978c r4:853a9380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85489800 r8:853a93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9380 r8:8027f5e8 r7:eb0d5e60 r6:853b0400 r5:85489800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b58c0 INFO: task kworker/0:570:4658 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d40ff000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8548bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r5:00001000 r4:eaef1000 r5:85459b8c r4:85459800 r10:61c88647 r9:8548bc00 r8:853a942c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b5cc0 INFO: task kworker/0:571:4659 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d48c4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b5d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85459f8c r4:85459c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85459f8c r4:853a9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce0c00 r8:853a94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9480 r8:8027f5e8 r7:eb0d5e60 r6:853a9500 r5:84ce0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b5b00 INFO: task kworker/0:572:4661 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d48c4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:eb199000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8541db8c r4:853b0500 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:4665 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:8548c800 r4:8548c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eaf71000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:853b5dc0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/0:574:4666 blocked for more than 462 seconds. r5:8548d400 r4:8291892c r4:00000000 r9:83018005 r8:8548d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:00001000 r4:eaf5d000 r7:dddced80 r6:83018000 r5:8545a78c r4:853a9600 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: d5313000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:4669 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb105d84 r8:00000002 r7:60000113 r6:eb105d8c r5:8548ec00 r4:8548ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545b78c r4:8545b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545b78c r4:853a9680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548ec00 r8:853a96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9680 r8:8027f5e8 r7:eb0fde60 r6:853b0700 r5:8548ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9100 INFO: task kworker/0:575:4669 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d5313000 eca73000 00000001 80239b98 7f185000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:576:4671 blocked for more than 462 seconds. [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8545af8c r4:8545ac00 r4:853a9700 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4672 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:8531e000 r4:8531e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf99000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545b38c r4:8545b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545b38c r4:853a9780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531e000 r8:853a97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9780 r8:8027f5e8 r7:eb105e60 r6:853b0800 r5:8531e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c91c0 Workqueue: events bpf_prog_free_deferred 9d20: d5313000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) INFO: task kworker/0:578:4675 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb111d84 r8:00000002 r7:60000113 r6:eb111d8c r5:85490000 r4:85490000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85490000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c95c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85490000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545bb8c r4:8545b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545bb8c r4:853a9800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490000 r8:853a982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9800 r8:8027f5e8 r7:eb105e60 r6:853b0880 r5:85490000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9440 INFO: task kworker/0:578:4675 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d5add000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb125000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545c38c r4:8545c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545c38c r4:853a9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490c00 r8:853a98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9880 r8:8027f5e8 r7:eb111e60 r6:853b0900 r5:85490c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9440 INFO: task kworker/0:579:4676 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d5add000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:4678 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:85491800 r4:85491800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85491800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85491800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545bf8c r4:8545bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545bf8c r4:853a9900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85491800 r8:853a992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9900 r8:8027f5e8 r7:eb119e60 r6:853b0980 r5:85491800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c94c0 INFO: task kworker/0:580:4678 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d5e57000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4681 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb135d84 r8:00000002 r7:60000013 r6:eb135d8c r5:85493c00 r4:85493c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85493c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545c78c r4:8545c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545c78c r4:853a9980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:853a99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9980 r8:8027f5e8 r7:eb119e60 r6:853b0a00 r5:85493c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c96c0 INFO: task kworker/0:581:4681 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d5e57000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:4683 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb13dd84 r8:00000002 r7:60000113 r6:eb13dd8c r5:85494800 r4:85494800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85494800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85494800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545cb8c r4:8545c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545cb8c r4:853a9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85494800 r8:853a9a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9a00 r8:8027f5e8 r7:eb135e60 r6:853b0a80 r5:85494800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c98c0 INFO: task kworker/0:582:4683 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d607b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:4685 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:85493000 r4:85493000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85493000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545d38c r4:8545d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545d38c r4:853a9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493000 r8:853a9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9a80 r8:8027f5e8 r7:eb13de60 r6:853b0b00 r5:85493000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c98c0 INFO: task kworker/0:583:4685 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d607b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:4686 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:85496000 r4:85496000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85496000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545cf8c r4:8545cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545cf8c r4:853a9b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496000 r8:853a9b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9b00 r8:8027f5e8 r7:eb145e60 r6:853b0b80 r5:85496000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9a40 INFO: task kworker/0:584:4686 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d681e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:4689 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb151d84 r8:00000002 r7:60000013 r6:eb151d8c r5:85495400 r4:85495400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85495400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b5dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85495400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545db8c r4:8545d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545db8c r4:853a9b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85495400 r8:853a9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9b80 r8:8027f5e8 r7:eb145e60 r6:853b0c00 r5:85495400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9cc0 INFO: task kworker/0:585:4689 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d681e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:4690 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:84ce6c00 r4:84ce6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa39000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545d78c r4:8545d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545d78c r4:853a9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce6c00 r8:853a9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9c00 r8:8027f5e8 r7:eb151e60 r6:853a9c80 r5:84ce6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9cc0 INFO: task kworker/0:586:4690 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d6c5e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:4692 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:853e3000 r4:853e3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d5200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545df8c r4:8545dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545df8c r4:853a9d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3000 r8:853a9d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9d00 r8:8027f5e8 r7:eb151e60 r6:853a9d80 r5:853e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb1fb0 to 0xeafb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9fc0 INFO: task kworker/0:587:4692 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d6fe5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:4694 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:4694 tgid:4694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:85408000 r4:85408000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85408000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d5440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85408000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545e38c r4:8545e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545e38c r4:853a9e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85408000 r8:853a9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9e00 r8:8027f5e8 r7:eafb1e60 r6:853a9e80 r5:85408000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9fc0 INFO: task kworker/0:588:4694 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d6fe5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:4698 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb159d84 r8:00000002 r7:60000013 r6:eb159d8c r5:85409800 r4:85409800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85409800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d55c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85409800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac53000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545eb8c r4:8545e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545eb8c r4:853a9f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85409800 r8:853a9f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a9f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a9f00 r8:8027f5e8 r7:eb155e60 r6:853a9f80 r5:85409800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d5280 INFO: task kworker/0:589:4698 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d70c6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:4700 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:8540a400 r4:8540a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d53c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545e78c r4:8545e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545e78c r4:853d7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540a400 r8:853d702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7000 r8:8027f5e8 r7:eb159e60 r6:853d7080 r5:8540a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d5580 INFO: task kworker/0:590:4700 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d7590000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:4702 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb161d84 r8:00000002 r7:60000013 r6:eb161d8c r5:8540b000 r4:8540b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d5640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545f38c r4:8545f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545f38c r4:853d7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540b000 r8:853d712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7100 r8:8027f5e8 r7:eb159e60 r6:853d7180 r5:8540b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d5800 INFO: task kworker/0:591:4702 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d7590000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:4704 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:8540bc00 r4:8540bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d56c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545ef8c r4:8545ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545ef8c r4:853d7200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540bc00 r8:853d722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7200 r8:8027f5e8 r7:eb161e60 r6:853d7280 r5:8540bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d5640 INFO: task kworker/0:592:4704 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d7a39000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:4706 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb169d84 r8:00000002 r7:60000013 r6:eb169d8c r5:8540c800 r4:8540c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d5980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545f78c r4:8545f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545f78c r4:853d7300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540c800 r8:853d732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7300 r8:8027f5e8 r7:eb161e60 r6:853d7380 r5:8540c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d58c0 INFO: task kworker/0:593:4706 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d7c95000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:4708 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb16dd84 r8:00000002 r7:60000013 r6:eb16dd8c r5:8540d400 r4:8540d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d5b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540d400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545fb8c r4:8545f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545fb8c r4:853d7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540d400 r8:853d742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7400 r8:8027f5e8 r7:eb169e60 r6:853d7480 r5:8540d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d5b40 INFO: task kworker/0:594:4708 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d7c95000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:4710 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:8540e000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae11000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ea6b8c r4:84ea6800 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:4712 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb175d84 r8:00000002 r7:60000113 r6:eb175d8c r5:8540ec00 r4:8540ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546838c r4:85468000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546838c r4:853d7600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540ec00 r8:853d762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7600 r8:8027f5e8 r7:eb171e60 r6:853d7680 r5:8540ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d5cc0 INFO: task kworker/0:596:4712 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d83d2000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85408c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eae4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546878c r4:85468400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546878c r4:853d7700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85408c00 r8:853d772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7700 r8:8027f5e8 r7:eb175e60 r6:853d7780 r5:85408c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847369c0 INFO: task kworker/0:597:4713 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cf480 r5:00001000 r4:eaeb3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546938c r4:85469000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ce5400 r8:853d782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7800 r8:8027f5e8 r7:eb0f9e60 r6:853d7880 r5:84ce5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c2d40 INFO: task kworker/0:598:4716 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:599:4718 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:84c50c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84c50c00 r8:853d792c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:599:4718 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:4720 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:84c50000 r4:84c50000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c50000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cf240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c50000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85468f8c r4:85468c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85468f8c r4:853d7a00 r10:61c88647 r9:84c50000 r8:853d7a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854cf080 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r5:00001000 r4:dfffd000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:4724 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:84c53c00 r4:84c53c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c53c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cf600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c53c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546978c r4:85469400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546978c r4:853d7c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c53c00 r8:853d7c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e04e9dc0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r5:00001000 r4:eb193000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8541d78c r4:853d7d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c54800 r8:853d7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7d00 r8:8027f5e8 r7:eb18de60 r6:853d7d80 r5:84c54800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cf700 INFO: task kworker/0:603:4726 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d91eb000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:85492400 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:854cf380 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:00001000 r4:eb1ad000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:196:4730 is blocked on a mutex likely owned by task kworker/0:187:3720. r4:e04e9dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/1:197:4732 blocked for more than 462 seconds. r4:85500000 r4:00000000 r4:00000000 r5:00001000 r4:eb0db000 r5:8541f38c r4:8541f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f38c r4:853b0e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85500000 r8:853b0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0e00 r8:8027f5e8 r7:eb1a5e60 r6:853b0e80 r5:85500000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c6a00 INFO: task kworker/1:197:4732 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d9962000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:198 state:D stack:0 pid:4733 tgid:4733 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85500c00 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa3f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e78c r4:8541e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e78c r4:853b0f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85500c00 r8:853b0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0f00 r8:8027f5e8 r7:eb1b9e60 r6:853b0f80 r5:85500c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c6a00 INFO: task kworker/1:198:4733 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: d9d63000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546a38c r4:8546a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546a38c r4:853d7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85502400 r8:853d7f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d7f00 r8:8027f5e8 r7:eb18de60 r6:854ce000 r5:85502400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cff00 INFO: task kworker/0:605:4737 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85503000 r4:8291892c r4:00000000 r5:00001000 r4:eaed5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541eb8c r4:8541e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541eb8c r4:854ce080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85503000 r8:854ce0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854ce080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce080 r8:8027f5e8 r7:eb1b9e60 r6:854ce100 r5:85503000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c6f80 INFO: task kworker/1:199:4739 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) Exception stack(0xe04e9fb0 to 0xe04e9ff8) r10:82918930 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:85504800 r5:00001000 r4:e07d7000 r5:8546af8c r4:8546ac00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bb0 r4:e04e9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736d00 r5:00001000 r4:e06e7000 r7:dddced80 r6:83018000 r5:8546ab8c r4:853d7e80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84faa100 r4:85506c00 r9:83018005 r8:85506c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:61c88647 r9:85506c00 r8:854c502c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:4746 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb129d84 r8:00000002 r7:60000013 r6:eb129d8c r5:85501800 r4:85501800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e48ef000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:610:4748 blocked for more than 462 seconds. r9:83018005 r8:85503c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r7:dddced80 r6:83018000 r5:8546bb8c r4:854c5100 r4:854d20c0 9d60: 80230ad4 80239bb0 80070013 ffffffff [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:82918930 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:84ccc800 r5:00001000 r4:eac79000 r10:61c88647 r9:84ccc800 r8:854c51ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:84c56000 r4:84c56000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c56000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d2300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c56000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546bf8c r4:8546bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:00001000 r4:dfe9b000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546c38c r4:854c5300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c56c00 r8:854c532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c5300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5300 r8:8027f5e8 r7:eb1e9e60 r6:854c5380 r5:84c56c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d23c0 INFO: task kworker/0:613:4755 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) r5:80070013 r4:80239bb0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:614:4756 blocked for more than 463 seconds. [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:614:4756 is blocked on a mutex likely owned by task kworker/0:187:3720. r5:80070013 r4:80239bb0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84faa100 Workqueue: events bpf_prog_free_deferred r5:85499800 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ead89000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: db869000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:616 state:D stack:0 pid:4762 tgid:4762 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ead53000 r7:dddced80 r6:83018000 r5:8546cf8c r4:854c5580 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d28c0 INFO: task kworker/0:616:4762 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dbf20000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d2ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85498000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546d78c r4:8546d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546d78c r4:854c5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498000 r8:854c562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5600 r8:8027f5e8 r7:eb209e60 r6:854ce580 r5:85498000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2980 INFO: task kworker/0:617:4763 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04e9dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaf11000 r7:dddced80 r6:83018000 r5:8546db8c r4:854c5680 INFO: task kworker/0:618:4766 is blocked on a mutex likely owned by task kworker/0:187:3720. Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dc142000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Call trace: [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:4769 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb239d84 r8:00000002 r7:60000113 r6:eb239d8c r5:85498c00 r4:85498c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb05f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dc869000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf55000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:620:4770 is blocked on a mutex likely owned by task kworker/0:187:3720. r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dc9ef000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018005 r8:8549d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:eaf6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546e38c r4:8546e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546e38c r4:854c5800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549d400 r8:854c582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5800 r8:8027f5e8 r7:eb239e60 r6:854ce880 r5:8549d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2e00 INFO: task kworker/0:621:4772 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dcf7f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8549ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8549ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546eb8c r4:8546e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 r5:00001000 r4:eb09d000 r5:8541ef8c r4:8541ec00 r10:61c88647 r9:8549a400 r8:854ce9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cd440 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dd4f2000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:623:4779 blocked for more than 463 seconds. [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854a0000 r8:854c592c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854eb100 INFO: task kworker/0:623:4779 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dd7af000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r5:00001000 r4:eb121000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8546ff8c r4:8546fc00 r4:854c5980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:625:4783 blocked for more than 463 seconds. r4:854a1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8546f78c r4:8546f400 r10:61c88647 r9:854a1800 r8:854c5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eb300 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:4785 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:854a2400 r4:854a2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854a2400 r8:854c5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eb340 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb26dd84 r8:00000002 r7:60000113 r6:eb26dd8c r5:854a3c00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb301000 r5:84d47f8c r4:84d47c00 r4:854cec80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb275d84 r8:00000002 r7:60000013 r6:eb275d8c r5:854a5400 r4:854a5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ed800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547038c r4:85470000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547038c r4:854ced80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a5400 r8:854cedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854ced80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ced80 r8:8027f5e8 r7:eb26de60 r6:854cee00 r5:854a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ed540 INFO: task kworker/1:203:4789 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: de379000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r5:854a4800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb28b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb27dfb0 to 0xeb27dff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:4792 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb211d84 r8:00000002 r7:60000013 r6:eb211d8c r5:84c53000 r4:84c53000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c53000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c53000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547078c r4:85470400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547078c r4:854c5c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c53000 r8:854c5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c5c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5c00 r8:8027f5e8 r7:eb27de60 r6:854c5c80 r5:84c53000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854eb5c0 INFO: task kworker/0:628:4792 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dee40000 eca73000 00000001 80239b98 7f185000 00000001 r4:e04e9dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84faa100 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r5:00001000 r4:eb229000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb201fb0 to 0xeb201ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:83888000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb1cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4838c r4:84d48000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4838c r4:854cef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83888000 r8:854cefac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cef80 r8:8027f5e8 r7:eb26de60 r6:854c5d80 r5:83888000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ed9c0 INFO: task kworker/1:205:4797 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dee40000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:629:4799 blocked for more than 463 seconds. r4:85508c00 r4:00000000 r9:83018005 r8:85508c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb295fb0 to 0xeb295ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r5:00001000 r4:dfe9b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:4801 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb279d84 r8:00000002 r7:60000113 r6:eb279d8c r5:85509800 r4:85509800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85509800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ebe00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85509800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85470f8c r4:85470c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85470f8c r4:854c5f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85509800 r8:854c5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5f00 r8:8027f5e8 r7:eb295e60 r6:854c5f80 r5:85509800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ebd40 INFO: task kworker/0:630:4801 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: df4a3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb281d84 r8:00000002 r7:60000113 r6:eb281d8c r5:8550a400 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa49000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ebf00 INFO: task kworker/0:631:4803 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dfbd7000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r9:83018005 r8:8550b000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 r5:00001000 r4:e052f000 r5:8547178c r4:85471400 r4:84355800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: dfbd7000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r5:00001000 r4:e078f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85471b8c r4:85471800 r10:61c88647 r9:8550bc00 r8:854ea0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f1100 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:4809 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:634 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:8550c800 r4:8550c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547238c r4:85472000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547238c r4:854ea180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550c800 r8:854ea1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea180 r8:8027f5e8 r7:eb281e60 r6:854ea200 r5:8550c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1180 INFO: task kworker/0:634:4809 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e00da000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab300 r4:00000001 Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:635 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:8550d400 r4:8550d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550d400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85472b8c r4:85472800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85472b8c r4:854ea280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550d400 r8:854ea2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea280 r8:8027f5e8 r7:eb2a5e60 r6:854ea300 r5:8550d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1180 INFO: task kworker/0:635:4811 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e04f4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:4812 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:8550e000 r4:8550e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547278c r4:85472400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547278c r4:854ea380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550e000 r8:854ea3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea380 r8:8027f5e8 r7:eb2ade60 r6:854ea400 r5:8550e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1180 INFO: task kworker/0:636:4812 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e04f4000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:4815 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:8550ec00 r4:8550ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac55000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85472f8c r4:85472c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85472f8c r4:854ea480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550ec00 r8:854ea4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea480 r8:8027f5e8 r7:eb2ade60 r6:854ea500 r5:8550ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1600 INFO: task kworker/0:637:4815 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e08e9000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:638:4817 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:638 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2b9d84 r8:00000002 r7:60000113 r6:eb2b9d8c r5:85508000 r4:85508000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85508000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85508000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547338c r4:85473000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547338c r4:854ea580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85508000 r8:854ea5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea580 r8:8027f5e8 r7:eb2b1e60 r6:854ea600 r5:85508000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1740 INFO: task kworker/0:638:4817 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e0c06000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:639:4819 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:639 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:85505400 r4:85505400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85505400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85505400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547378c r4:85473400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547378c r4:854ea680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85505400 r8:854ea6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea680 r8:8027f5e8 r7:eb2b9e60 r6:854ea700 r5:85505400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1840 INFO: task kworker/0:639:4819 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e0c06000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:640:4820 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2b5d84 r8:00000002 r7:60000013 r6:eb2b5d8c r5:85520000 r4:85520000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85520000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85520000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85473b8c r4:85473800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85473b8c r4:854ea780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520000 r8:854ea7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea780 r8:8027f5e8 r7:eb2bde60 r6:854ea800 r5:85520000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1840 INFO: task kworker/0:640:4820 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e180c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:4823 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2c5d84 r8:00000002 r7:60000013 r6:eb2c5d8c r5:85520c00 r4:85520c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85520c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c082c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85520c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae61000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548038c r4:85480000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548038c r4:854ea880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520c00 r8:854ea8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea880 r8:8027f5e8 r7:eb2b5e60 r6:854ea900 r5:85520c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1840 INFO: task kworker/0:641:4823 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e1899000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:4824 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:85522400 r4:85522400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85522400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85522400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85473f8c r4:85473c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85473f8c r4:854ea980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85522400 r8:854ea9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea980 r8:8027f5e8 r7:eb2c5e60 r6:854eaa00 r5:85522400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f1840 INFO: task kworker/0:642:4824 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e1d0d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:4826 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2cdd84 r8:00000002 r7:60000113 r6:eb2cdd8c r5:85521800 r4:85521800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85521800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85521800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85480b8c r4:85480800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85480b8c r4:854eaa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85521800 r8:854eaaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eaa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eaa80 r8:8027f5e8 r7:eb2c5e60 r6:854eab00 r5:85521800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08100 INFO: task kworker/0:643:4826 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e1f7e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:4828 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:85523000 r4:85523000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85523000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c085c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85523000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548078c r4:85480400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548078c r4:854eab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85523000 r8:854eabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eab80 r8:8027f5e8 r7:eb2cde60 r6:854eac00 r5:85523000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08080 INFO: task kworker/0:644:4828 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e24da000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:4831 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:85524800 r4:85524800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85524800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85524800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb197000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548178c r4:85481400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548178c r4:854eac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85524800 r8:854eacac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eac80 r8:8027f5e8 r7:eb2cde60 r6:854ead00 r5:85524800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08700 INFO: task kworker/0:645:4831 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e24da000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:646:4834 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:646 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2c1d84 r8:00000002 r7:60000013 r6:eb2c1d8c r5:85525400 r4:85525400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85525400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85525400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85480f8c r4:85480c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85480f8c r4:854ead80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85525400 r8:854eadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ead80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ead80 r8:8027f5e8 r7:eb2d5e60 r6:854eae00 r5:85525400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08900 INFO: task kworker/0:646:4834 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e2b83000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:4836 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:85526000 r4:85526000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85526000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85526000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb187000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548138c r4:85481000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548138c r4:854eae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526000 r8:854eaeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eae80 r8:8027f5e8 r7:eb2d5e60 r6:854eaf00 r5:85526000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08900 INFO: task kworker/0:647:4836 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e2b83000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:4837 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2e1d84 r8:00000002 r7:60000013 r6:eb2e1d8c r5:85526c00 r4:85526c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85526c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85526c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85481b8c r4:85481800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85481b8c r4:854eaf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526c00 r8:854eafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eaf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eaf80 r8:8027f5e8 r7:eb2d5e60 r6:84dc2000 r5:85526c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08a00 INFO: task kworker/0:648:4837 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e3494000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:4840 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2e5d84 r8:00000002 r7:60000013 r6:eb2e5d8c r5:845d0000 r4:845d0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08e00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85481f8c r4:85481c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85481f8c r4:84dc2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d0000 r8:84dc20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2080 r8:8027f5e8 r7:eb2e1e60 r6:84dc2100 r5:845d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08f00 INFO: task kworker/0:649:4840 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e3dc3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:4842 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2fdd84 r8:00000002 r7:60000013 r6:eb2fdd8c r5:845d0c00 r4:845d0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb325000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85482b8c r4:85482800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85482b8c r4:84dc2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d0c00 r8:84dc21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2180 r8:8027f5e8 r7:eb2e5e60 r6:84dc2200 r5:845d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08d80 INFO: task kworker/0:650:4842 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e3dc3000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:4844 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb30dd84 r8:00000002 r7:60000013 r6:eb30dd8c r5:845d2400 r4:845d2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcb440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb313000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d47b8c r4:84d47800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84d47b8c r4:84dc2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d2400 r8:84dc22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2280 r8:8027f5e8 r7:eb2fde60 r6:84dc2300 r5:845d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08e80 INFO: task kworker/0:651:4844 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e45fd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:4846 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:854a3000 r4:854a3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddc680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448b8c r4:85448800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85448b8c r4:84c0e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a3000 r8:84c0e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0e080 r8:8027f5e8 r7:eb26de60 r6:84c0e100 r5:854a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dcb300 INFO: task kworker/1:206:4846 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e45fd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:4849 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:854a6000 r4:854a6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba080 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb319000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548238c r4:85482000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548238c r4:84dc2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6000 r8:84dc23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2380 r8:8027f5e8 r7:eb2fde60 r6:84c0e180 r5:854a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba040 INFO: task kworker/0:652:4849 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e45fd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:4850 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb329d84 r8:00000002 r7:60000013 r6:eb329d8c r5:854a6c00 r4:854a6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548278c r4:85482400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548278c r4:84dc2400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6c00 r8:84dc242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2400 r8:8027f5e8 r7:eb2fde60 r6:84c0e200 r5:854a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba2c0 INFO: task kworker/0:653:4850 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e45fd000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:4853 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:84cb1800 r4:84cb1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb337000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85482f8c r4:85482c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85482f8c r4:84dc2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb1800 r8:84dc24ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2480 r8:8027f5e8 r7:eb2fde60 r6:84c0e280 r5:84cb1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba2c0 INFO: task kworker/0:654:4853 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e51d6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:4855 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:4855 tgid:4855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:84cb0c00 r4:84cb0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85483b8c r4:85483800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85483b8c r4:84dc2500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb0c00 r8:84dc252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2500 r8:8027f5e8 r7:eb341e60 r6:84c0e300 r5:84cb0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba440 INFO: task kworker/0:655:4855 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e5d78000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:4856 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb351d84 r8:00000002 r7:60000013 r6:eb351d8c r5:84cb0000 r4:84cb0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548338c r4:85483000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548338c r4:84dc2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb0000 r8:84dc25ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2580 r8:8027f5e8 r7:eb34de60 r6:84c0e380 r5:84cb0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba440 INFO: task kworker/0:656:4856 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e5d78000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:4858 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:84cb3c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:84cb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:00001000 r4:eb357000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8548378c r4:85483400 r7:dddced80 r6:83018000 r5:8548378c r4:84dc2600 r4:84dc2600 Exception stack(0xeb361fb0 to 0xeb361ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:82ac11e4 r4:e04e9dc0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:4861 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb371d84 r8:00000002 r7:60000013 r6:eb371d8c r5:84cb3000 r4:84cb3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ba980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85483f8c r4:85483c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85483f8c r4:84dc2680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb3000 r8:84dc26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2680 r8:8027f5e8 r7:eb34de60 r6:84c0e480 r5:84cb3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba6c0 INFO: task kworker/0:658:4861 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:659:4863 blocked for more than 464 seconds. task:kworker/0:659 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84cb2400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:84cb2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r5:00001000 r4:eb391000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb385fb0 to 0xeb385ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:4864 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb311d84 r8:00000002 r7:60000113 r6:eb311d8c r5:845d1800 r4:845d1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847baa40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548438c r4:85484000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548438c r4:84dc2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d1800 r8:84dc27ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2780 r8:8027f5e8 r7:eb385e60 r6:84dc2800 r5:845d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ba900 INFO: task kworker/0:660:4864 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e70c6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:4866 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:845d3c00 r4:845d3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08f40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4878c r4:84d48400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4878c r4:84c0e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d3c00 r8:84c0e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0e580 r8:8027f5e8 r7:eb2dde60 r6:84dc2880 r5:845d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dcbcc0 INFO: task kworker/1:207:4866 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e7689000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:661 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r5:00001000 r4:eb38b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:845d5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1f80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484f8c r4:85484c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85484f8c r4:84dc2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d5400 r8:84dc2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2a00 r8:8027f5e8 r7:eb385e60 r6:84dc2a80 r5:845d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847baf40 INFO: task kworker/0:662:4870 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e816e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb3b3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb395fb0 to 0xeb395ff8) INFO: task kworker/0:663:4871 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:84ea6b8c r4:84ea6800 r4:84fab300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r5:00001000 r4:eb479000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8557738c r4:84dc2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d6c00 r8:84dc2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2c00 r8:8027f5e8 r7:eb395e60 r6:84dc2c80 r5:845d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847baec0 INFO: task kworker/0:664:4873 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e816e000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:4877 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3b1d84 r8:00000002 r7:60000013 r6:eb3b1d8c r5:85523c00 r4:85523c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85523c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd7d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85523c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8548538c r4:84dc2d00 r4:00000001 r4:84dd02c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e9fb0 to 0xe04e9ff8) task:kworker/0:666 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85530000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:85485b8c r4:84dc2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85530000 r8:84dc2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2e00 r8:8027f5e8 r7:eb3b1e60 r6:84dc2e80 r5:85530000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd02c0 INFO: task kworker/0:666:4879 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e87a2000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Not tainted 6.15.0-syzkaller #0 r4:84cb6c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0657000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84c0e600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:4882 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:84cb6000 r4:84cb6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddc4c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cb6000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8939000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544878c r4:85448400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544878c r4:84c0e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb6000 r8:84c0e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0e700 r8:8027f5e8 r7:eb2dde60 r6:84c0e780 r5:84cb6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e916f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85485f8c r4:84dc2f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb4800 r8:84dc2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dc2f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc2f00 r8:8027f5e8 r7:eb3b1e60 r6:84c0e800 r5:84cb4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd0400 INFO: task kworker/0:667:4883 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead91000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84dd0540 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:210 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddc740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448f8c r4:85448c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85448f8c r4:84c0e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a8000 r8:84c0e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0e900 r8:8027f5e8 r7:eb2dde60 r6:84c0e980 r5:854a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddc640 INFO: task kworker/1:210:4890 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e9b46000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:211 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r5:00001000 r4:ead47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8544938c r4:84c0ea00 Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) Call trace: r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: e9b46000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:854ab000 r4:854ab000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ab000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddcd40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544978c r4:85449400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544978c r4:84c0eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ab000 r8:84c0eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85530c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r5:00001000 r4:eb45f000 r7:dddced80 r6:83018000 r5:8548678c r4:84dd3000 Exception stack(0xeb20dfb0 to 0xeb20dff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e9fb0 to 0xe04e9ff8) Not tainted 6.15.0-syzkaller #0 r4:85532400 r4:00000000 r4:00000000 r5:00001000 r4:eaf5f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449f8c r4:85449c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85449f8c r4:84c0ec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85532400 r8:84c0ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ec00 r8:8027f5e8 r7:eb3d9e60 r6:84dd3100 r5:85532400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddcb40 INFO: task kworker/1:213:4897 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ea1db000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4899 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4899 tgid:4899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:85533000 r4:85533000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85533000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddcec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85533000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf39000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449b8c r4:85449800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85449b8c r4:84c0ec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85533000 r8:84c0ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ec80 r8:8027f5e8 r7:eb3dde60 r6:84dd3180 r5:85533000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddce00 INFO: task kworker/1:214:4899 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ea511000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:4901 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3e9d84 r8:00000002 r7:60000113 r6:eb3e9d8c r5:85534800 r4:85534800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85534800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85534800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a78c r4:8544a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544a78c r4:84c0ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85534800 r8:84c0ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ed00 r8:8027f5e8 r7:eb3dde60 r6:84dd3200 r5:85534800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dcbf40 INFO: task kworker/1:215:4901 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ea8bf000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:4904 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3f5d84 r8:00000002 r7:60000113 r6:eb3f5d8c r5:85533c00 r4:85533c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85533c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcb740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85533c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a38c r4:8544a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544a38c r4:84c0ed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85533c00 r8:84c0edac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ed80 r8:8027f5e8 r7:eb3e9e60 r6:84dd3280 r5:85533c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf0c0 INFO: task kworker/1:216:4904 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: eabd0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:4905 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:85536c00 r4:85536c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85536c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85536c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bf8c r4:8544bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544bf8c r4:84c0ee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85536c00 r8:84c0ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ee00 r8:8027f5e8 r7:eb3e9e60 r6:84dd3300 r5:85536c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf0c0 INFO: task kworker/1:217:4905 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: eabd0000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4906 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3fdd84 r8:00000002 r7:60000013 r6:eb3fdd8c r5:85535400 r4:85535400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85535400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85535400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb061000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544ab8c r4:8544a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544ab8c r4:84c0ee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85535400 r8:84c0eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ee80 r8:8027f5e8 r7:eb3f9e60 r6:84dd3380 r5:85535400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf0c0 INFO: task kworker/1:218:4906 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: eb2e9000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:4908 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:84710000 r4:84710000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84710000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84710000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544af8c r4:8544ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544af8c r4:84c0ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84710000 r8:84c0ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ef00 r8:8027f5e8 r7:eb3f9e60 r6:84dd3400 r5:84710000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf200 INFO: task kworker/1:219:4908 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: eb56f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:4910 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:84711800 r4:84711800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84711800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84711800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b38c r4:8544b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544b38c r4:84c0ef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84711800 r8:84c0efac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0ef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c0ef80 r8:8027f5e8 r7:eb3f9e60 r6:84dd3480 r5:84711800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf340 INFO: task kworker/1:220:4910 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: eba41000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:4912 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb415d84 r8:00000002 r7:60000013 r6:eb415d8c r5:84710c00 r4:84710c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84710c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84710c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b78c r4:8544b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544b78c r4:854fc000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84710c00 r8:854fc02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fc000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc000 r8:8027f5e8 r7:eb3f9e60 r6:84dd3500 r5:84710c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf400 INFO: task kworker/1:221:4912 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ebd23000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:4914 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:854a9800 r4:854a9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddf700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bb8c r4:8544b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544bb8c r4:854fc080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a9800 r8:854fc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fc080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc080 r8:8027f5e8 r7:eb3f9e60 r6:854fc100 r5:854a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ddf540 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ebf5b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4917 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:854abc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r5:00001000 r4:eb1d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:223:4917 is blocked on a mutex likely owned by task kworker/0:187:3720. Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e9fb0 to 0xe04e9ff8) r4:84faa100 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854fc280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc280 r8:8027f5e8 r7:eb41de60 r6:854fc300 r5:854ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddf980 INFO: task kworker/1:224:4919 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ec3a8000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:4921 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:854ad400 r4:854ad400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ad400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddfe40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb227000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85574f8c r4:854fc380 Exception stack(0xeb425fb0 to 0xeb425ff8) INFO: task kworker/1:225:4921 is blocked on a mutex likely owned by task kworker/0:187:3720. 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:4922 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb429d84 r8:00000002 r7:60000113 r6:eb429d8c r5:854ae000 r4:854ae000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ae000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddfc80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85574b8c r4:85574800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85574b8c r4:854fc480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ae000 r8:854fc4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fc480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc480 r8:8027f5e8 r7:eb425e60 r6:854fc500 r5:854ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e04e9dc0 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb23f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:227:4925 is blocked on a mutex likely owned by task kworker/0:187:3720. Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:4927 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:854aa400 r4:00000000 r5:00001000 r4:eb28d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 7f2b7000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918930 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:854b8000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d2f300 r5:00001000 r4:eb299000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb439fb0 to 0xeb439ff8) INFO: task kworker/1:230:4931 is blocked on a mutex likely owned by task kworker/0:188:3724. 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 Not tainted 6.15.0-syzkaller #0 r4:854b8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r5:00001000 r4:eb441000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8557638c r4:854fc880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8c00 r8:854fc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc880 r8:8027f5e8 r7:eb439e60 r6:854fca00 r5:854b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2f440 INFO: task kworker/1:231:4933 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 7fadf000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4935 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb445d84 r8:00000002 r7:60000013 r6:eb445d8c r5:854b9800 r4:854b9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d2f440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854fca80 r8:8027f5e8 r7:eb43de60 r6:854fcb00 r5:854b9800 INFO: task kworker/1:232:4935 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 7fcec000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb455000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:233:4937 is blocked on a mutex likely owned by task kworker/0:188:3724. 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:234 state:D stack:0 pid:4939 tgid:4939 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854fcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2f740 INFO: task kworker/1:234:4939 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8050c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:4940 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:854bc800 r4:854bc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd7b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb465000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854bc800 r8:854fcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/1:236:4944 blocked for more than 465 seconds. r4:854bd400 r4:00000000 r4:00000000 r5:00001000 r4:eaddf000 r5:8557778c r4:85577400 r4:854fce80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2fd40 INFO: task kworker/1:236:4944 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8087f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:670:4945 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:670 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:854be000 r4:854be000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854be000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd7e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854be000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb331fb0 to 0xeb331ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r5:00001000 r4:eaa29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8548738c r4:84dd3600 r10:00000000 r9:84dd3600 r8:8027f5e8 r7:eb331e60 r6:854f7000 r5:854b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd7e00 INFO: task kworker/0:671:4950 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 811cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:4952 blocked for more than 465 seconds. task:kworker/0:672 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8548778c r4:84dd3680 Exception stack(0xeb481fb0 to 0xeb481ff8) INFO: task kworker/0:672:4952 is blocked on a mutex likely owned by task kworker/0:188:3724. Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:673:4954 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:854b2400 r4:854b2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd7380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85487b8c r4:85487800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85487b8c r4:84dd3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b2400 r8:84dd372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3700 r8:8027f5e8 r7:eb481e60 r6:854f7100 r5:854b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd7980 INFO: task kworker/0:673:4954 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:4956 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:84715400 r4:84715400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84715400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e7900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84715400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85540f8c r4:85540c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85540f8c r4:84dd3780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84715400 r8:84dd37ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3780 r8:8027f5e8 r7:eb485e60 r6:84dd3800 r5:84715400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e7100 INFO: task kworker/0:674:4956 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 817b9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85487f8c r4:85487c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85487f8c r4:84dd3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84716000 r8:84dd38ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3880 r8:8027f5e8 r7:eb345e60 r6:84dd3900 r5:84716000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e7100 INFO: task kworker/0:675:4957 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 81b97000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84713000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:00001000 r4:eb539000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb48dfb0 to 0xeb48dff8) r4:854f5180 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfecf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Workqueue: events bpf_prog_free_deferred r5:84712400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e7600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84712400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554038c r4:85540000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554038c r4:84dd3a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84712400 r8:84dd3a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3a00 r8:8027f5e8 r7:eb345e60 r6:84dd3a80 r5:84712400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e7000 INFO: task kworker/0:676:4960 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 81c3c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Not tainted 6.15.0-syzkaller #0 r5:84714800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb14b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854f7200 r8:8027f5e8 r7:eb48de60 r6:84dd3b00 r5:84714800 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:4964 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:84713c00 r4:84713c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84713c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e7680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554078c r4:85540400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554078c r4:84dd3b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84713c00 r8:84dd3bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3b80 r8:8027f5e8 r7:eb345e60 r6:84dd3c00 r5:84713c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/0:678:4967 blocked for more than 465 seconds. r4:84716c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r5:00001000 r4:eaea5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85540b8c r4:85540800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85540b8c r4:84dd3c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84716c00 r8:84dd3cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3c80 r8:8027f5e8 r7:eb345e60 r6:84dd3d00 r5:84716c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e7780 INFO: task kworker/0:678:4967 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb195000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84dd3d80 r10:00000000 r9:84dd3d80 r8:8027f5e8 r7:eb345e60 r6:84dd3e00 r5:85531800 Exception stack(0xeb49dfb0 to 0xeb49dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e04e5dc0 r4:00000000 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:84ea6f8c r4:84ea6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:4970 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb365d84 r8:00000002 r7:60000113 r6:eb365d8c r5:85536000 r4:85536000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85536000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e7c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85536000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554178c r4:85541400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554178c r4:84dd3e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85536000 r8:84dd3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd3e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd3e80 r8:8027f5e8 r7:eb49de60 r6:84dd3f00 r5:85536000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e7780 INFO: task kworker/0:680:4970 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 82d0f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:4972 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4a1d84 r8:00000002 r7:60000113 r6:eb4a1d8c r5:84c48000 r4:84c48000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c48000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5f40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c48000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85577f8c r4:85577c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85577f8c r4:854f7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c48000 r8:854f72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7280 r8:8027f5e8 r7:eb48de60 r6:84dd3f80 r5:84c48000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f5600 INFO: task kworker/1:239:4972 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 82d0f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:4974 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:84c48c00 r4:84c48c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c48c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e7e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c48c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85541b8c r4:85541800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85541b8c r4:84dd6000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c48c00 r8:84dd602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd6000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd6000 r8:8027f5e8 r7:eb365e60 r6:84dd6080 r5:84c48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e7cc0 INFO: task kworker/0:681:4974 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8323d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:4976 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:84c49800 r4:84c49800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c49800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb307000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85541f8c r4:85541c00 r4:84dd6100 Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) r4:84dd7100 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:4980 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4add84 r8:00000002 r7:60000013 r6:eb4add8c r5:84c4b000 r4:84c4b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c4b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb335000 r5:85542b8c r4:85542800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c4bc00 r4:00000000 r5:00001000 r4:eb321000 r4:84dd6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd6380 r8:8027f5e8 r7:eb4ade60 r6:84dd6400 r5:84c4bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e1c040 INFO: task kworker/0:685:4981 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 83e90000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fab400 INFO: task kworker/0:686:4984 blocked for more than 465 seconds. [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb347000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 84247000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84c4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:00001000 r4:eb35b000 r5:8554338c r4:85543000 r10:61c88647 r9:84c4d400 r8:84dd65ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c4e000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85543b8c r4:85543800 r7:dddced80 r6:83018000 r5:85543b8c r4:84dd6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4e000 r8:84dd66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd6680 r8:8027f5e8 r7:eb4bde60 r6:84dd6700 r5:84c4e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e1c540 INFO: task kworker/0:688:4988 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 843dc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c4ec00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84c4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r5:00001000 r4:eb375000 r5:8554378c r4:85543400 r10:61c88647 r9:84c4ec00 r8:84dd67ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:84c4a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r5:00001000 r4:eb397000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85543f8c r4:84dd6880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:4994 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4d1d84 r8:00000002 r7:60000013 r6:eb4d1d8c r5:847d8c00 r4:847d8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e1cb00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554c38c r4:8554c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554c38c r4:84dd6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d8c00 r8:84dd69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd6980 r8:8027f5e8 r7:eb4c9e60 r6:84dd6a00 r5:847d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e1cb80 INFO: task kworker/0:691:4994 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r9:83018005 r8:847d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84dd6a80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:4998 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4e5d84 r8:00000002 r7:60000013 r6:eb4e5d8c r5:847db000 r4:847db000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847db000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dde040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847db000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554c78c r4:8554c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554c78c r4:84dd6b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847db000 r8:84dd6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd6b80 r8:8027f5e8 r7:eb4d5e60 r6:84dd6c00 r5:847db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e1ce00 INFO: task kworker/0:693:4998 is blocked on a mutex likely owned by task kworker/0:188:3724. r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:240 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb4d9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:694:5003 blocked for more than 466 seconds. r4:847da400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r5:00001000 r4:eb4f5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554cb8c r4:8554c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554cb8c r4:84dd6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847da400 r8:84dd6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dd6d00 r8:8027f5e8 r7:eb4d5e60 r6:84dd6d80 r5:847da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4edfb0 to 0xeb4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dde100 INFO: task kworker/0:694:5003 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 85212000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:5004 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:847dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:00001000 r4:eb4fb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:847de000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r5:00001000 r4:eb50b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847de000 r8:84dd6f2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:5009 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:847d8000 r4:847d8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddea80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554df8c r4:8554dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554df8c r4:854ff000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d8000 r8:854ff02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ff000 r8:8027f5e8 r7:eb4cde60 r6:854ff080 r5:847d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dde600 INFO: task kworker/0:697:5009 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb511000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8554db8c r4:854ff100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dde8c0 INFO: task kworker/0:698:5010 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 85bdb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:5012 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:5012 tgid:5012 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:855c8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 r5:00001000 r4:eb525000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855c8c00 r8:854ff22c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb533000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:5016 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:855cb000 r4:855cb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855cb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddb240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554f38c r4:8554f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554f38c r4:854ff400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855cb000 r8:854ff42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ff400 r8:8027f5e8 r7:eb531e60 r6:854ff480 r5:855cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddeec0 INFO: task kworker/0:701:5016 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 85e3d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:00001000 r4:dfecf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:241 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb555000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85584f8c r4:85584c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85584f8c r4:854f7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b3c00 r8:854f742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7400 r8:8027f5e8 r7:eb48de60 r6:854f7480 r5:854b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f5540 INFO: task kworker/1:241:5018 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 86108000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:5019 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb549d84 r8:00000002 r7:60000013 r6:eb549d8c r5:854b6c00 r4:854b6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddb040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb563000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554eb8c r4:8554e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554eb8c r4:854ff500 r4:854ff500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:5020 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:854b6000 r4:854b6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e34080 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb54f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854b6000 r8:854f752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5540 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:854b5400 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb1f1000 r5:8558578c r4:85585400 r10:61c88647 r9:854b5400 r8:854f76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e34100 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:703:5026 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:703 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:854ba400 r4:854ba400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ba400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa61000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:704 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r5:00001000 r4:eaf9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb575fb0 to 0xeb575ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddb380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554f78c r4:8554f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554f78c r4:854ff680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b0000 r8:854ff6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ff680 r8:8027f5e8 r7:eb575e60 r6:854f7880 r5:854b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddb280 INFO: task kworker/0:705:5030 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 87326000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r9:83018005 r8:855e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 r5:00001000 r4:ea9c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554fb8c r4:8554f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554fb8c r4:854ff700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e1800 r8:854ff72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ff700 r8:8027f5e8 r7:eb575e60 r6:854f7900 r5:855e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddb3c0 INFO: task kworker/0:706:5033 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 877f9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r5:00001000 r4:eabb5000 r5:8554ff8c r4:8554fc00 r4:854ff780 Exception stack(0xeb589fb0 to 0xeb589ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac4d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84ddb640 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:709:5038 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:709 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb599d84 r8:00000002 r7:60000013 r6:eb599d8c r5:855e2400 r4:855e2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddb940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555c78c r4:8555c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555c78c r4:854ff880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e2400 r8:854ff8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ff880 r8:8027f5e8 r7:eb575e60 r6:854f7a80 r5:855e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddb780 INFO: task kworker/0:709:5038 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaeef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555cb8c r4:854ff900 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84faa640 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:855e5400 r4:855e5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddbb40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555cf8c r4:8555cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555cf8c r4:854ff980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e5400 r8:854ff9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ff980 r8:8027f5e8 r7:eb575e60 r6:854f7b80 r5:855e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddbc80 INFO: task kworker/0:711:5042 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 88285000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:855e4800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:854ffa00 r8:8027f5e8 r7:eb575e60 r6:854f7c00 r5:855e4800 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8555db8c r4:8555d800 r4:00000001 r4:84ddbd80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 888b2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:5050 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:855e6c00 r4:855e6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afa80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb411000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r5:00001000 r4:eb0bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854ffb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ffb80 r8:8027f5e8 r7:eb5c9e60 r6:854f7d80 r5:855e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855af280 INFO: task kworker/0:715:5051 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 88d86000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:716:5053 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:716 state:D stack:0 pid:5053 tgid:5053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5d1d84 r8:00000002 r7:60000013 r6:eb5d1d8c r5:855e8c00 r4:855e8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb0eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:00001000 r4:eb3f1000 r10:61c88647 r9:855c8000 r8:854ffcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855af300 INFO: task kworker/0:717:5054 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 88fed000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:5057 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:5057 tgid:5057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:855ca400 r4:855ca400 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85585b8c r4:85585800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85585b8c r4:854f7e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ca400 r8:854f7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7e80 r8:8027f5e8 r7:eb545e60 r6:854ffd80 r5:855ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561f000 INFO: task kworker/1:244:5057 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 89423000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:5059 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:855ce000 r4:855ce000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ce000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85586f8c r4:85586c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85586f8c r4:854f7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ce000 r8:854f7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7f00 r8:8027f5e8 r7:eb5d9e60 r6:854ffe00 r5:855ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561f000 INFO: task kworker/1:245:5059 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 89423000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855cd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r5:00001000 r4:eb241000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 89724000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:5061 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:5061 tgid:5061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5edd84 r8:00000002 r7:60000113 r6:eb5edd8c r5:855cbc00 r4:855cbc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855cbc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f2c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85585f8c r4:85585c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855cbc00 r8:8561902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:248 state:D stack:0 pid:5063 tgid:5063 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3a5000 r5:8558638c r4:85586000 r10:61c88647 r9:854bec00 r8:856190ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:5065 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:855e9800 r4:855e9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556cf8c r4:8556cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556cf8c r4:85619100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e9800 r8:8561912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619100 r8:8027f5e8 r7:eb5e1e60 r6:85619180 r5:855e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561f3c0 INFO: task kworker/1:249:5065 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 89f25000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:855ea400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ea400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aff40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ef8c r4:8555ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555ef8c r4:84e21000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ea400 r8:84e2102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21000 r8:8027f5e8 r7:eb5c9e60 r6:85619200 r5:855ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:855afe80 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:5071 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:855ec800 r4:855ec800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ec800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ddbe80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ff8c r4:8555fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555ff8c r4:84e21080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ec800 r8:84e210ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21080 r8:8027f5e8 r7:eb5c9e60 r6:85619280 r5:855ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855afbc0 INFO: task kworker/0:719:5071 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8a54d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855eb000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r5:00001000 r4:eb43f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555f78c r4:84e21100 Exception stack(0xeb60dfb0 to 0xeb60dff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb451000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:855cec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855cec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561c1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb477000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556078c r4:85560400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556078c r4:84e21280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855cec00 r8:84e212ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21280 r8:8027f5e8 r7:eb609e60 r6:84e21300 r5:855cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ddbec0 INFO: task kworker/0:722:5077 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8ac20000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb46f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847dec00 r8:84e213ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ea6f8c r4:84ea6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04e5fb0 to 0xe04e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84ce8c00 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561c3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb569000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85560b8c r4:85560800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85560b8c r4:84e21480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce8c00 r8:84e214ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21480 r8:8027f5e8 r7:eb611e60 r6:84e21500 r5:84ce8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561c2c0 INFO: task kworker/0:724:5081 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8b329000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:5083 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:725 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:84cea400 r4:84cea400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cea400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561c600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cea400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb627000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85560f8c r4:85560c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85560f8c r4:84e21580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cea400 r8:84e215ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21580 r8:8027f5e8 r7:eb559e60 r6:84e21600 r5:84cea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561c380 INFO: task kworker/0:725:5083 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8b329000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:5085 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:5085 tgid:5085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:84ce8000 r4:84ce8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561c700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce8000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556138c r4:85561000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556138c r4:84e21680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce8000 r8:84e216ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21680 r8:8027f5e8 r7:eb625e60 r6:84e21700 r5:84ce8000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:5086 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:84ceb000 r4:84ceb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ceb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561c940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ceb000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556178c r4:85561400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556178c r4:84e21780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ceb000 r8:84e217ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21780 r8:8027f5e8 r7:eb61de60 r6:84e21800 r5:84ceb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561c840 INFO: task kworker/0:727:5086 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8b760000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:728:5089 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:728 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb631d84 r8:00000002 r7:60000113 r6:eb631d8c r5:84cebc00 r4:84cebc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cebc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561ca00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb645000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85561b8c r4:85561800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85561b8c r4:84e21880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cebc00 r8:84e218ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21880 r8:8027f5e8 r7:eb639e60 r6:84e21900 r5:84cebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561c900 INFO: task kworker/0:728:5089 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8bb69000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:5092 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:84cec800 r4:84cec800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cec800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561cb40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cec800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb653000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85561f8c r4:85561c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85561f8c r4:84e21980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cec800 r8:84e219ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21980 r8:8027f5e8 r7:eb631e60 r6:84e21a00 r5:84cec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561ca40 INFO: task kworker/0:729:5092 is blocked on a mutex likely owned by task kworker/0:188:3724. r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:730 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84ced400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r5:00001000 r4:dfe9d000 r5:8556238c r4:85562000 r4:84e21a80 Exception stack(0xeb63dfb0 to 0xeb63dff8) r4:8561ca40 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:5095 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb651d84 r8:00000002 r7:60000013 r6:eb651d8c r5:84cee000 r4:84cee000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cee000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561cf40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cee000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556278c r4:85562400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556278c r4:84e21b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cee000 r8:84e21bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21b80 r8:8027f5e8 r7:eb63de60 r6:84e21c00 r5:84cee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561cd40 INFO: task kworker/0:731:5095 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8bf52000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:5096 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb65dd84 r8:00000002 r7:60000013 r6:eb65dd8c r5:84ce9800 r4:84ce9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562e3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae45000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556338c r4:85563000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556338c r4:84e21c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce9800 r8:84e21cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21c80 r8:8027f5e8 r7:eb651e60 r6:84e21d00 r5:84ce9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:855d8000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eab61000 r5:85562b8c r4:85562800 r10:61c88647 r9:855d8000 r8:84e21dac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855d8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562e2c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85562f8c r4:85562c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85562f8c r4:84e21e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d8c00 r8:84e21eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e21e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e21e80 r8:8027f5e8 r7:eb65de60 r6:84e21f00 r5:855d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562e100 INFO: task kworker/0:734:5101 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8ca6c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:735:5104 blocked for more than 466 seconds. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaeb5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855ee000 r8:84e21fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562e280 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855e3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562e600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb137000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85563b8c r4:85563800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85563b8c r4:8562f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e3c00 r8:8562f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f000 r8:8027f5e8 r7:eb675e60 r6:85619400 r5:855e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562e4c0 INFO: task kworker/0:736:5107 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8ca6c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:5108 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84cf0000 r4:00000000 r9:83018005 r8:84cf0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r5:00001000 r4:eb309000 r5:8556c78c r4:8556c400 r4:8562f080 Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562e4c0 INFO: task kworker/0:737:5108 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8cf54000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cf1800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb19f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84cf3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556c38c r4:8556c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556c38c r4:8562f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf3000 r8:8562f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f180 r8:8027f5e8 r7:eb685e60 r6:85619580 r5:84cf3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562e780 INFO: task kworker/0:739:5112 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84cf0c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ec40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb359000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556d38c r4:8556d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556d38c r4:8562f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf0c00 r8:8562f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f200 r8:8027f5e8 r7:eb685e60 r6:85619600 r5:84cf0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562e900 INFO: task kworker/0:740:5113 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8d7ea000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:741:5115 blocked for more than 466 seconds. task:kworker/0:741 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ebc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855db000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556cb8c r4:8556c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556cb8c r4:8562f280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855db000 r8:8562f2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f280 r8:8027f5e8 r7:eb699e60 r6:8562f300 r5:855db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562e980 INFO: task kworker/0:741:5115 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8d7ea000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:742:5117 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:742 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb377000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e5d28 to 0xe04e5d70) r4:e04e5dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:5121 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:84cf5400 r4:84cf5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb4fd000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8dd12000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:84cf6c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c040 r5:00001000 r4:eb38f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84cf6c00 r8:8562f52c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf4800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556e78c r4:8556e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556e78c r4:8562f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf4800 r8:8562f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f580 r8:8027f5e8 r7:eb6ade60 r6:85619800 r5:84cf4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563c2c0 INFO: task kworker/0:744:5125 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8e50e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:745:5126 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:745 state:D stack:0 pid:5126 tgid:5126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6b9d84 r8:00000002 r7:60000013 r6:eb6b9d8c r5:84cf2400 r5:84cf2400 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3ab000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r5:00001000 r4:dfecf000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:855ebc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ebc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556e38c r4:8556e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556e38c r4:8562f680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ebc00 r8:8562f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f680 r8:8027f5e8 r7:eb6b5e60 r6:85619900 r5:855ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563c140 INFO: task kworker/0:746:5127 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8e50e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:5130 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84cf3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r5:00001000 r4:eb4f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556eb8c r4:8562f700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf3c00 r8:8562f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f700 r8:8027f5e8 r7:eb6b5e60 r6:85619980 r5:84cf3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563c5c0 INFO: task kworker/0:747:5130 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8ecd3000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cc40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556fb8c r4:8556f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556fb8c r4:8562f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855eec00 r8:8562f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f780 r8:8027f5e8 r7:eb6c9e60 r6:85619a00 r5:855eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563c340 INFO: task kworker/0:748:5132 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8ecd3000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e04e5dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb523000 r5:8556ef8c r4:8556ec00 r4:8562f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f800 r8:8027f5e8 r7:eb6d1e60 r6:85619a80 r5:855ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563c340 INFO: task kworker/0:749:5133 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8f236000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:251:5136 blocked for more than 467 seconds. r5:846e0000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb6fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb69dfb0 to 0xeb69dff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb517000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558738c r4:85587000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558738c r4:85619c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e1800 r8:85619c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619c00 r8:8027f5e8 r7:eb69de60 r6:85619c80 r5:846e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638780 INFO: task kworker/1:252:5138 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 8f236000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 task:kworker/1:253 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564ab00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:846e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4938c r4:84d49000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4938c r4:85619d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e2400 r8:85619d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619d00 r8:8027f5e8 r7:eb69de60 r6:85619d80 r5:846e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638780 INFO: task kworker/1:253:5139 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb535000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:5144 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:5144 tgid:5144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6ddd84 r8:00000002 r7:60000013 r6:eb6ddd8c r5:855dec00 r4:855dec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855dec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563ca80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb541000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556f78c r4:8556f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556f78c r4:8562f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dec00 r8:8562f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f980 r8:8027f5e8 r7:eb6d1e60 r6:8562fa00 r5:855dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6ddfb0 to 0xeb6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563ca40 INFO: task kworker/0:751:5144 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:752:5146 blocked for more than 467 seconds. [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb6ed000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8562fa80 r8:8027f5e8 r7:eb6d1e60 r6:8562fb00 r5:855de000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) r4:84faa640 task:kworker/0:753 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cf40 r5:00001000 r4:eb567000 r7:dddced80 r6:83018000 r5:8556ff8c r4:8562fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dc800 r8:8562fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562fb80 r8:8027f5e8 r7:eb6e5e60 r6:8562fc00 r5:855dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563c840 INFO: task kworker/0:753:5147 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9044d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:5150 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:855d9800 r4:855d9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648780 r5:00001000 r4:eb711000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85690f8c r4:85690c00 r10:61c88647 r9:855d9800 r8:8562fcac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856484c0 r5:00001000 r4:eb701000 r7:dddced80 r6:83018000 r5:8569078c r4:8562fd80 r4:00000001 r4:85648100 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:5155 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:5155 tgid:5155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb715d84 r8:00000002 r7:60000113 r6:eb715d8c r5:855dd400 r4:855dd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855dd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85690b8c r4:85690800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85690b8c r4:8562fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dd400 r8:8562feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562fe80 r8:8027f5e8 r7:eb6f5e60 r6:8562ff00 r5:855dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85648000 INFO: task kworker/0:756:5155 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 90936000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:757:5158 blocked for more than 467 seconds. [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648880 r5:00001000 r4:eb71b000 r7:dddced80 r6:83018000 r5:8569138c r4:8562ff80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648940 r5:00001000 r4:eb721000 r7:dddced80 r6:83018000 r5:8569178c r4:85643000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643000 r8:8027f5e8 r7:eb705e60 r6:85643080 r5:85668c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85648800 INFO: task kworker/0:758:5160 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 911d4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:5162 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:85669800 r4:85669800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85669800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb72f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:254 state:D stack:0 pid:5163 tgid:5163 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564aa00 r5:00001000 r4:dfa83000 r7:ddde2d80 r6:83018200 r5:85587f8c r4:85619e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566a400 r8:85619e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619e00 r8:8027f5e8 r7:eb6d9e60 r6:85643200 r5:8566a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a240 INFO: task kworker/1:254:5163 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9130f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:5164 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:8566b000 r4:8566b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8566b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb74b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb73dfb0 to 0xeb73dff8) r4:85648980 Workqueue: events bpf_prog_free_deferred [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9130f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb735000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85691f8c r4:85643380 5fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474c140 r5:00001000 r4:eb765000 r7:dddced80 r6:83018000 r5:85692f8c r4:85643480 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563cbc0 INFO: task kworker/0:762:5168 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 91b9d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5169 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:8566d400 r4:8566d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8566d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ed80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8566d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb751000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569278c r4:85692400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569278c r4:85643580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566d400 r8:856435ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643580 r8:8027f5e8 r7:eb739e60 r6:85643600 r5:8566d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d20: 91b9d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:e04e5dc0 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:764 state:D stack:0 pid:5172 tgid:5172 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8566e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474c000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8566e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85692b8c r4:85692800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85692b8c r4:85643680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566e000 r8:856436ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643680 r8:8027f5e8 r7:eb739e60 r6:85643700 r5:8566e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474c280 INFO: task kworker/0:764:5172 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 91eea000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:765 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb787000 r5:85693b8c r4:85693800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474c440 INFO: task kworker/0:765:5174 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 91fe2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:5175 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5175 tgid:5175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:85678c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb76f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8569338c r4:85643880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:5178 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eb75dd84 r8:00000002 r7:60000013 r6:eb75dd8c r5:85679800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb775000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb75dfb0 to 0xeb75dff8) r4:8474c6c0 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb78d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5182 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5182 tgid:5182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb791d84 r8:00000002 r7:60000013 r6:eb791d8c r5:8567b000 r4:8567b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474c9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569c38c r4:8569c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569c38c r4:85643b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567b000 r8:85643bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643b80 r8:8027f5e8 r7:eb785e60 r6:85643c00 r5:8567b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474cb00 INFO: task kworker/0:769:5182 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:00001000 r4:dfecf000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:ead61000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569cb8c r4:85643c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567c800 r8:85643cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643c80 r8:8027f5e8 r7:eb791e60 r6:85643d00 r5:8567c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474c900 INFO: task kworker/0:770:5184 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 929d1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:5186 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:8567e000 r4:8567e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474cec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e012d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569c78c r4:8569c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569c78c r4:85643d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567e000 r8:85643dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643d80 r8:8027f5e8 r7:eb7a5e60 r6:85643e00 r5:8567e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474cc40 INFO: task kworker/0:771:5186 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 92faa000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:5190 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:5190 tgid:5190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5add84 r8:00000002 r7:60000113 r6:eb5add8c r5:8567bc00 r4:8567bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564ac40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8567bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d48f8c r4:84d48c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d48f8c r4:85619e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567bc00 r8:85619eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619e80 r8:8027f5e8 r7:eb6d9e60 r6:85643e80 r5:8567bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564ab40 INFO: task kworker/1:255:5190 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 92faa000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:5192 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5b5d84 r8:00000002 r7:60000013 r6:eb5b5d8c r5:85670000 r4:85670000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85670000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fb180 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85670000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b378c r4:856b3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b378c r4:85619f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85670000 r8:85619f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619f00 r8:8027f5e8 r7:eb5ade60 r6:85643f00 r5:85670000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564ab40 INFO: task kworker/1:256:5192 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85670c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85619f80 r8:8027f5e8 r7:eb5b5e60 r6:85643f80 r5:85670c00 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Call trace: r10:82918930 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:85672400 r4:85672400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85672400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85672400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569cf8c r4:8569cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569cf8c r4:846de000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85672400 r8:846de02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de000 r8:8027f5e8 r7:eb7a5e60 r6:846de080 r5:85672400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84785180 INFO: task kworker/0:772:5195 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 936c2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785640 r5:00001000 r4:eaf89000 r7:dddced80 r6:83018000 r5:8569d38c r4:846de100 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 93a7c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5199 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7b9d84 r8:00000002 r7:60000013 r6:eb7b9d8c r5:85674800 r4:85674800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85674800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785880 r5:00001000 r4:eb083000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8569d78c r4:846de200 Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfecf000 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/0:775 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb77dd84 r8:00000002 r7:60000013 r6:eb77dd8c r5:846e5400 r4:846e5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846e5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb113000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569df8c r4:8569dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569df8c r4:846de300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e5400 r8:846de32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de300 r8:8027f5e8 r7:eb7b9e60 r6:846da000 r5:846e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb77dfb0 to 0xeb77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84785580 INFO: task kworker/0:775:5201 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 93f49000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:5203 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3b9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e4800 r8:846de42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de400 r8:8027f5e8 r7:eb77de60 r6:846da100 r5:846e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84785a00 INFO: task kworker/0:777:5205 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9452a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eb7c9d84 r8:00000002 r7:60000113 r6:eb7c9d8c r5:846e3000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785c40 r5:00001000 r4:eb22f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:846de480 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 94789000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:82ac11e4 r4:e04e5dc0 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:5209 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:5209 tgid:5209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7cdd84 r8:00000002 r7:60000113 r6:eb7cdd8c r5:846e3c00 r4:846e3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846e3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569e78c r4:8569e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569e78c r4:846de500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e3c00 r8:846de52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de500 r8:8027f5e8 r7:eb7c5e60 r6:846da200 r5:846e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84785e80 INFO: task kworker/0:779:5209 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 94c4b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:5210 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:846e0c00 r4:846e0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846e0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fb400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:846e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4978c r4:84d49400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4978c r4:846da280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e0c00 r8:846da2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846da280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846da280 r8:8027f5e8 r7:eb5b5e60 r6:846da300 r5:846e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a100 INFO: task kworker/1:258:5210 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 951de000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:780:5211 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7d5d84 r8:00000002 r7:60000013 r6:eb7d5d8c r5:8566ec00 r4:8566ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8566ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8566ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569ef8c r4:8569ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569ef8c r4:846de580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566ec00 r8:846de5ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:846de580 r8:8027f5e8 r7:eb7c5e60 r6:846da380 r5:8566ec00 r4:84785cc0 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/0:781:5215 blocked for more than 467 seconds. r10:82918930 r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:855f0c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb463000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8569ff8c r4:846de600 r10:00000000 r9:846de600 r8:8027f5e8 r7:eb7d5e60 r6:846da400 r5:855f0c00 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:5216 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7e5d84 r8:00000002 r7:60000113 r6:eb7e5d8c r5:855f1800 r4:855f1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb409000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569f38c r4:8569f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569f38c r4:846de680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f1800 r8:846de6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de680 r8:8027f5e8 r7:eb7e1e60 r6:846da480 r5:855f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478e280 INFO: task kworker/0:782:5216 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9573d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5218 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7edd84 r8:00000002 r7:60000013 r6:eb7edd8c r5:855f0000 r4:855f0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb419000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569f78c r4:8569f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569f78c r4:846de700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f0000 r8:846de72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de700 r8:8027f5e8 r7:eb7e1e60 r6:846da500 r5:855f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478e500 INFO: task kworker/0:783:5218 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 95f83000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:5220 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:5220 tgid:5220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5a5d84 r8:00000002 r7:60000113 r6:eb5a5d8c r5:85676000 r4:85676000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85676000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85676000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569fb8c r4:8569f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569fb8c r4:846de780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85676000 r8:846de7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de780 r8:8027f5e8 r7:eb7e1e60 r6:846de800 r5:85676000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478e440 INFO: task kworker/0:784:5220 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 95f83000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:5223 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:5223 tgid:5223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:85676c00 r4:85676c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85676c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e780 r5:00001000 r4:eb47b000 r5:856a438c r4:856a4000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478e600 INFO: task kworker/0:785:5223 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 96292000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5225 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7f5d84 r8:00000002 r7:60000013 r6:eb7f5d8c r5:85675400 r4:85675400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85675400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85675400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a478c r4:856a4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a478c r4:846de980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85675400 r8:846de9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846de980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846de980 r8:8027f5e8 r7:eb7f1e60 r6:846dea00 r5:85675400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478e7c0 INFO: task kworker/0:786:5225 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:85671800 r4:85671800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85671800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478eac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85671800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a4b8c r4:856a4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a4b8c r4:846dea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85671800 r8:846deaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846dea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dea80 r8:8027f5e8 r7:eb7f5e60 r6:846deb00 r5:85671800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478e980 INFO: task kworker/0:787:5227 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 96461000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:5229 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5229 tgid:5229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7fdd84 r8:00000002 r7:60000013 r6:eb7fdd8c r5:85673000 r5:85673000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb5b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 968b8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:846e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r5:00001000 r4:eb5d3000 r5:856a538c r4:856a5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a538c r4:846dec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e6000 r8:846decac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846dec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dec80 r8:8027f5e8 r7:eb7fde60 r6:846ded00 r5:846e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8478ec40 INFO: task kworker/0:789:5231 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 96bb1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5232 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb809d84 r8:00000002 r7:60000013 r6:eb809d8c r5:8567d400 r4:8567d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474cc40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567d400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a578c r4:856a5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a578c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567d400 r8:846dedac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785e40 r5:00001000 r4:eb5ef000 r7:dddced80 r6:83018000 r5:856a5b8c r4:846dee80 r10:00000000 r9:846dee80 r8:8027f5e8 r7:eb809e60 r6:846def00 r5:8567ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474cdc0 INFO: task kworker/0:791:5234 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 97120000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:5237 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:84d00000 r4:84d00000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d00000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846def80 1fa0: 00000000 00000000 00000000 00000000 Call trace: 5d20: 97120000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:793 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a5f8c r4:856a5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a5f8c r4:85653080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d00c00 r8:856530ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653080 r8:8027f5e8 r7:eb811e60 r6:85653100 r5:84d00c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d17000 INFO: task kworker/0:793:5238 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9741d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:5241 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:5241 tgid:5241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb815d84 r8:00000002 r7:60000013 r6:eb815d8c r5:84d01800 r4:84d01800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d01800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d17280 r5:00001000 r4:eb621000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85653180 r8:8027f5e8 r7:eb811e60 r6:85653200 r5:84d01800 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d17480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d02400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb633000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6b8c r4:856a6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a6b8c r4:85653280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d02400 r8:856532ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653280 r8:8027f5e8 r7:eb815e60 r6:85653300 r5:84d02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb81dfb0 to 0xeb81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d172c0 INFO: task kworker/0:795:5243 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9741d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:796 state:D stack:0 pid:5245 tgid:5245 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb643000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6f8c r4:856a6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a6f8c r4:85653380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d03000 r8:856533ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653380 r8:8027f5e8 r7:eb81de60 r6:85653400 r5:84d03000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d173c0 INFO: task kworker/0:796:5245 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 97d8f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:797:5247 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:84d03c00 r4:84d03c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d03c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d17700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 r5:00001000 r4:eb655000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856a738c r4:856a7000 r10:61c88647 r9:84d03c00 r8:856534ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d17600 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:5249 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:5249 tgid:5249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb829d84 r8:00000002 r7:60000113 r6:eb829d8c r5:84d04800 r4:84d04800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d04800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r5:00001000 r4:eb82d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856a778c r4:856a7400 r4:85653580 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb83b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb831fb0 to 0xeb831ff8) r4:84d17900 Call trace: 5d20: 983d2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:5253 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:5253 tgid:5253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb839d84 r8:00000002 r7:60000113 r6:eb839d8c r5:84d06000 r4:84d06000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d06000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d17b80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d06000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb841000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a7f8c r4:856a7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a7f8c r4:85653780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d06000 r8:856537ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653780 r8:8027f5e8 r7:eb831e60 r6:85653800 r5:84d06000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb839fb0 to 0xeb839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d17a40 INFO: task kworker/0:800:5253 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 983d2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:801:5255 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:801 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb845d84 r8:00000002 r7:60000113 r6:eb845d8c r5:84d06c00 r4:84d06c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d06c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d17dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b038c r4:856b0000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b038c r4:85653880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d06c00 r8:856538ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653880 r8:8027f5e8 r7:eb839e60 r6:85653900 r5:84d06c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d17bc0 INFO: task kworker/0:801:5255 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:84ea6f8c r4:84ea6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:802 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85680000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84785a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85680000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b078c r4:856b0400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b078c r4:85653980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85680000 r8:856539ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653980 r8:8027f5e8 r7:eb845e60 r6:85653a00 r5:85680000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d17d80 INFO: task kworker/0:802:5257 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 989dd000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5259 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:803 state:D stack:0 pid:5259 tgid:5259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb859d84 r8:00000002 r7:60000013 r6:eb859d8c r5:85680c00 r4:85680c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85680c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85680c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb869000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b0f8c r4:856b0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b0f8c r4:85653a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85680c00 r8:85653aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653a80 r8:8027f5e8 r7:eb84de60 r6:85653b00 r5:85680c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cb000 INFO: task kworker/0:803:5259 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 989dd000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:804:5261 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:804 state:D stack:0 pid:5261 tgid:5261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb861d84 r8:00000002 r7:60000013 r6:eb861d8c r5:85681800 r4:85681800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85681800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85681800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb863000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b0b8c r4:856b0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b0b8c r4:85653b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85681800 r8:85653bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653b80 r8:8027f5e8 r7:eb859e60 r6:85653c00 r5:85681800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cb300 INFO: task kworker/0:804:5261 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 98df4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:805:5264 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:805 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb86dd84 r8:00000002 r7:60000013 r6:eb86dd8c r5:85682400 r4:85682400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85682400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85682400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb877000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b138c r4:856b1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b138c r4:85653c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85682400 r8:85653cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653c80 r8:8027f5e8 r7:eb859e60 r6:85653d00 r5:85682400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cb180 INFO: task kworker/0:805:5264 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 990a9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:806:5265 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:806 state:D stack:0 pid:5265 tgid:5265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb875d84 r8:00000002 r7:60000113 r6:eb875d8c r5:85683000 r4:85683000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85683000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb87d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85653d80 r8:8027f5e8 r7:eb86de60 r6:85653e00 r5:85683000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e04e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:85683c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb88b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85683c00 r8:85653eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb500 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 99423000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:808:5269 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:808 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:85684800 r4:85684800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85684800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85684800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb891000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b1f8c r4:856b1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b1f8c r4:85653f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85684800 r8:85653fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85653f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85653f80 r8:8027f5e8 r7:eb889e60 r6:856ee000 r5:85684800 Exception stack(0xeb819fb0 to 0xeb819ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:809:5271 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:85685400 r4:85685400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85685400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cbd80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85685400 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b2f8c r4:856b2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b2f8c r4:856ee080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85685400 r8:856ee0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee080 r8:8027f5e8 r7:eb819e60 r6:856ee100 r5:85685400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cb980 INFO: task kworker/0:809:5271 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9982d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856ee180 Exception stack(0xeb89dfb0 to 0xeb89dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 99a1c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:811:5275 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:811 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8a9d84 r8:00000002 r7:60000113 r6:eb8a9d8c r5:85686c00 r4:85686c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85686c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cba80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85686c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b278c r4:856b2400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b278c r4:856ee280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:856ee280 r8:8027f5e8 r7:eb895e60 r6:856ee300 r5:85686c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856cb900 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:82ac11e4 r4:e04e5dc0 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:812 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:847f8000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cbcc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b2b8c r4:856b2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b2b8c r4:856ee380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8000 r8:856ee3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee380 r8:8027f5e8 r7:eb895e60 r6:856ee400 r5:847f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cbc80 INFO: task kworker/0:812:5277 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 99ff9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:813:5280 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:813 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8c5d84 r8:00000002 r7:60000013 r6:eb8c5d8c r5:847f8c00 r4:847f8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564ae00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b338c r4:856b3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b338c r4:856ee480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8c00 r8:856ee4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee480 r8:8027f5e8 r7:eb895e60 r6:856ee500 r5:847f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c5fb0 to 0xeb8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a100 INFO: task kworker/0:813:5280 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9a35a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5281 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8bdd84 r8:00000002 r7:60000113 r6:eb8bdd8c r5:847f9800 r4:847f9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b3b8c r4:856b3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b3b8c r4:856ee580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f9800 r8:856ee5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee580 r8:8027f5e8 r7:eb8c5e60 r6:856ee600 r5:847f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cbec0 INFO: task kworker/0:814:5281 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9a481000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:815 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaaf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b3f8c r4:856b3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b3f8c r4:856ee680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fa400 r8:856ee6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee680 r8:8027f5e8 r7:eb8bde60 r6:856ee700 r5:847fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fa0c0 INFO: task kworker/0:815:5284 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9a481000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:816:5286 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:816 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8e1d84 r8:00000002 r7:60000013 r6:eb8e1d8c r5:847fb000 r4:847fb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847fb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856faf80 r5:00001000 r4:eb315000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:856b978c r4:856ee780 1fa0: 00000000 00000000 00000000 00000000 r4:856fa280 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:817:5288 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:847fc800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa6d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b838c r4:856b8000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b838c r4:856ee880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fc800 r8:856ee8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee880 r8:8027f5e8 r7:eb8e1e60 r6:856ee900 r5:847fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fa380 INFO: task kworker/0:817:5288 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9a7ea000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:818:5290 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:818 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8e5d84 r8:00000002 r7:60000113 r6:eb8e5d8c r5:847fe000 r4:847fe000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847fe000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b878c r4:856b8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b878c r4:856ee980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fe000 r8:856ee9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ee980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee980 r8:8027f5e8 r7:eb8e1e60 r6:856eea00 r5:847fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fa640 INFO: task kworker/0:818:5290 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9ac48000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:819:5291 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:819 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r5:00001000 r4:eb14d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:84ea6f8c r4:84ea6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:5294 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:5294 tgid:5294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:856e0c00 r4:856e0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fbc80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a4b8c r4:855a4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a4b8c r4:846da580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0c00 r8:846da5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846da580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846da580 r8:8027f5e8 r7:eb7d1e60 r6:856eeb80 r5:856e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fb3c0 INFO: task kworker/1:259:5294 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9b425000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:260:5295 blocked for more than 468 seconds. task:kworker/1:260 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8f9d84 r8:00000002 r7:60000113 r6:eb8f9d8c r5:856e1800 r4:856e1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fb940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a438c r4:855a4000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a438c r4:846da600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e1800 r8:846da62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846da600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846da600 r8:8027f5e8 r7:eb8f5e60 r6:856eec00 r5:856e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fb3c0 INFO: task kworker/1:260:5295 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9b425000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b938c r4:856b9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b938c r4:856eec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0000 r8:856eecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856eec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eec80 r8:8027f5e8 r7:eb8e1e60 r6:856eed00 r5:856e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fae80 INFO: task kworker/0:820:5298 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9b425000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:821:5300 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:821 state:D stack:0 pid:5300 tgid:5300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8fdd84 r8:00000002 r7:60000013 r6:eb8fdd8c r5:855f4800 r4:855f4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb333000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:856b9b8c r4:856eed80 r10:61c88647 r9:855f4800 r8:856eedac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856eed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eed80 r8:8027f5e8 r7:eb8e1e60 r6:846da680 r5:855f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857040c0 INFO: task kworker/0:821:5300 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9b959000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:822:5302 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:822 state:D stack:0 pid:5302 tgid:5302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb901d84 r8:00000002 r7:60000013 r6:eb901d8c r5:855f5400 r4:855f5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85704240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b9f8c r4:856b9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b9f8c r4:856eee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f5400 r8:856eee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856eee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eee00 r8:8027f5e8 r7:eb8fde60 r6:846da700 r5:855f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85704140 INFO: task kworker/0:822:5302 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9bb1e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:823:5304 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:823 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb905d84 r8:00000002 r7:60000013 r6:eb905d8c r5:855f6000 r4:855f6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857046c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb507000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ba78c r4:856ba400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ba78c r4:856eee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f6000 r8:856eeeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856eee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eee80 r8:8027f5e8 r7:eb901e60 r6:846da780 r5:855f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85704200 INFO: task kworker/0:823:5304 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9be31000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:824:5305 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:824 state:D stack:0 pid:5305 tgid:5305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb909d84 r8:00000002 r7:60000113 r6:eb909d8c r5:855f6c00 r4:855f6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85704300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ba38c r4:856ba000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ba38c r4:856eef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f6c00 r8:856eef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856eef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eef00 r8:8027f5e8 r7:eb905e60 r6:846da800 r5:855f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb909fb0 to 0xeb909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857044c0 INFO: task kworker/0:824:5305 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9be31000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:825:5307 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:825 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:855f3c00 r4:855f3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857047c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bab8c r4:856ba800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856bab8c r4:856eef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f3c00 r8:856eefac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856eef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eef80 r8:8027f5e8 r7:eb905e60 r6:846da880 r5:855f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85704100 INFO: task kworker/0:825:5307 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9c0b7000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:5309 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:5309 tgid:5309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb90dd84 r8:00000002 r7:60000113 r6:eb90dd8c r5:855f2400 r4:855f2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fbb80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a478c r4:855a4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a478c r4:846da900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f2400 r8:846da92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846da900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846da900 r8:8027f5e8 r7:eb8f5e60 r6:846da980 r5:855f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fba80 INFO: task kworker/1:261:5309 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9c3c2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:262:5311 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:262 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8edd84 r8:00000002 r7:60000113 r6:eb8edd8c r5:855f3000 r4:855f3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 r5:00001000 r4:eb64b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855a5f8c r4:846daa00 r10:00000000 r9:846daa00 r8:8027f5e8 r7:eb8f5e60 r6:846daa80 r5:855f3000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84ceec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ceec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fbec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ceec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856baf8c r4:856bac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856baf8c r4:846dab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ceec00 r8:846dab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dab00 r8:8027f5e8 r7:eb8ede60 r6:846dab80 r5:84ceec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fbc00 INFO: task kworker/1:263:5313 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9c7a2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856d8000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb671000 r5:856bbb8c r4:856bb800 r4:856f9000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: 9c966000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:5318 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb915d84 r8:00000002 r7:60000113 r6:eb915d8c r5:856d8c00 r4:856d8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a4f8c r4:855a4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a4f8c r4:846dac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d8c00 r8:846dacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dac80 r8:8027f5e8 r7:eb8ede60 r6:846dad00 r5:856d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fbe80 INFO: task kworker/1:264:5318 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856d9800 r4:8291892c r4:00000000 r9:83018005 r8:856d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb921fb0 to 0xeb921ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:828:5322 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:828 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb929d84 r8:00000002 r7:60000113 r6:eb929d8c r5:856db000 r4:856db000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856db000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85704d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856db000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bb78c r4:856bb400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856bb78c r4:856f9180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856db000 r8:856f91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9180 r8:8027f5e8 r7:eb919e60 r6:846dae00 r5:856db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85704c00 INFO: task kworker/0:828:5322 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb687000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r5:800f0013 r4:80239bb0 r4:00000000 r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:830:5326 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:830 state:D stack:0 pid:5326 tgid:5326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb939d84 r8:00000002 r7:60000013 r6:eb939d8c r5:856dd400 r4:856dd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb707000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4f8c r4:856c4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c4f8c r4:856f9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dd400 r8:856f92ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9280 r8:8027f5e8 r7:eb931e60 r6:846daf00 r5:856dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb939fb0 to 0xeb939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85704f00 INFO: task kworker/0:830:5326 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb6a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856de000 r8:856f932c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:832 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fb340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c478c r4:856c4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c478c r4:856f9380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dbc00 r8:856f93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9380 r8:8027f5e8 r7:eb939e60 r6:85703000 r5:856dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85704ac0 INFO: task kworker/0:832:5329 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9d8ce000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:5332 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:5332 tgid:5332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb935d84 r8:00000002 r7:60000113 r6:eb935d8c r5:856dec00 r4:856dec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa080 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4b8c r4:856c4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c4b8c r4:85703080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dec00 r8:857030ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85703080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85703080 r8:8027f5e8 r7:eb8ede60 r6:85703100 r5:856dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857013c0 INFO: task kworker/1:265:5332 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:856da400 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb62b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5336 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:856e5400 r4:856e5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5f8c r4:856c5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c5f8c r4:856f9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e5400 r8:856f942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9400 r8:8027f5e8 r7:eb939e60 r6:856f9480 r5:856e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8280 INFO: task kworker/0:833:5336 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9e169000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:834:5338 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:834 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb945d84 r8:00000002 r7:60000013 r6:eb945d8c r5:856e6000 r4:856e6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c538c r4:856c5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c538c r4:856f9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6000 r8:856f952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9500 r8:8027f5e8 r7:eb925e60 r6:856f9580 r5:856e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8080 INFO: task kworker/0:834:5338 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9e169000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfecf000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:835:5340 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred r4:856e6c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c578c r4:856c5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c578c r4:856f9600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6c00 r8:856f962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9600 r8:8027f5e8 r7:eb925e60 r6:856f9680 r5:856e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8300 INFO: task kworker/0:835:5340 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9e616000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:5342 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:5342 tgid:5342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb94dd84 r8:00000002 r7:60000013 r6:eb94dd8c r5:856e3000 r4:856e3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8400 r5:00001000 r4:eb729000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:eb74f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c638c r4:856c6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c638c r4:856f9800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e4800 r8:856f982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9800 r8:8027f5e8 r7:eb925e60 r6:856f9880 r5:856e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8440 INFO: task kworker/0:837:5344 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9ea7f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:856e3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r5:00001000 r4:eb76d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856c6b8c r4:856c6800 r4:856f9900 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d20: 9eedf000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r5:800f0013 r4:80239bb0 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb761000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c678c r4:856c6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c678c r4:856f9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e2400 r8:856f9a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9a00 r8:8027f5e8 r7:eb955e60 r6:856f9a80 r5:856e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb959fb0 to 0xeb959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f88c0 INFO: task kworker/0:839:5348 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9f25b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:5350 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:5350 tgid:5350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:847fec00 r4:847fec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847fec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c6f8c r4:856c6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c6f8c r4:856f9b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fec00 r8:856f9b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9b00 r8:8027f5e8 r7:eb955e60 r6:856f9b80 r5:847fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8a80 INFO: task kworker/0:840:5350 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9f493000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:841:5351 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb965d84 r8:00000002 r7:60000013 r6:eb965d8c r5:847fd400 r4:847fd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847fd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570d040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c778c r4:856c7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c778c r4:856f9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fd400 r8:856f9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9c00 r8:8027f5e8 r7:eb95de60 r6:856f9c80 r5:847fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8d80 INFO: task kworker/0:841:5351 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9f68a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:842:5354 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c738c r4:856c7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c738c r4:856f9d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85738000 r8:856f9d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9d00 r8:8027f5e8 r7:eb965e60 r6:856f9d80 r5:85738000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d000 INFO: task kworker/0:842:5354 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9fa11000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb96dd84 r8:00000002 r7:60000113 r6:eb96dd8c r5:85738c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb7a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d20: 9fbf4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:eb971d84 r8:00000002 r7:60000013 r6:eb971d8c r5:85739800 r5:85739800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570d480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85739800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb983000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578838c r4:85788000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578838c r4:856f9f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85739800 r8:856f9f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9f00 r8:8027f5e8 r7:eb96de60 r6:856f9f80 r5:85739800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d240 INFO: task kworker/0:844:5358 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9fbf4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:845:5360 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:845 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:8573a400 r4:8573a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570d3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb975000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c7f8c r4:856c7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c7f8c r4:856f9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573a400 r8:856f90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9080 r8:8027f5e8 r7:eb971e60 r6:85717000 r5:8573a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d300 INFO: task kworker/0:845:5360 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: 9ff89000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:5362 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb981d84 r8:00000002 r7:60000013 r6:eb981d8c r5:8573b000 r4:8573b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570d680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578878c r4:85788400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578878c r4:85717080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573b000 r8:857170ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717080 r8:8027f5e8 r7:eb971e60 r6:85717100 r5:8573b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d4c0 INFO: task kworker/0:846:5362 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a03f6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:847:5364 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:847 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:8573bc00 r4:8573bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570da00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788f8c r4:85788c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85788f8c r4:85717180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573bc00 r8:857171ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717180 r8:8027f5e8 r7:eb981e60 r6:85717200 r5:8573bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d5c0 INFO: task kworker/0:847:5364 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a03f6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:848:5366 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:848 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7d9d84 r8:00000002 r7:60000013 r6:eb7d9d8c r5:8573c800 r4:8573c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570d800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788b8c r4:85788800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85788b8c r4:85717280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573c800 r8:857172ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717280 r8:8027f5e8 r7:eb98de60 r6:85717300 r5:8573c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d740 INFO: task kworker/0:848:5366 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a074a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:849:5368 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:849 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:8573d400 r4:8573d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570de00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573d400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb057000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85789b8c r4:85789800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85789b8c r4:85717380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573d400 r8:857173ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717380 r8:8027f5e8 r7:eb98de60 r6:85717400 r5:8573d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570d740 INFO: task kworker/0:849:5368 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a0c39000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:5370 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:850 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:8573e000 r4:8573e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570db40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578938c r4:85789000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578938c r4:85717480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573e000 r8:857174ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717480 r8:8027f5e8 r7:eb7dde60 r6:85717500 r5:8573e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570dc80 INFO: task kworker/0:850:5370 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a1074000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:851:5372 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:851 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb871d84 r8:00000002 r7:60000013 r6:eb871d8c r5:8573ec00 r4:8573ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570de40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8573ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578978c r4:85789400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578978c r4:85717580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573ec00 r8:857175ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717580 r8:8027f5e8 r7:eb7dde60 r6:85717600 r5:8573ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570dcc0 INFO: task kworker/0:851:5372 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a147a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:852:5374 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:852 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb881d84 r8:00000002 r7:60000013 r6:eb881d8c r5:84c98000 r4:84c98000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c98000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8f00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c98000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85789f8c r4:85789c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85789f8c r4:85717680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c98000 r8:857176ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717680 r8:8027f5e8 r7:eb7dde60 r6:85717700 r5:84c98000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f8f40 INFO: task kworker/0:852:5374 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a1930000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:5376 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb969d84 r8:00000002 r7:60000013 r6:eb969d8c r5:84c99800 r4:84c99800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c99800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857266c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c99800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb417000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578af8c r4:8578ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578af8c r4:85717780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c99800 r8:857177ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717780 r8:8027f5e8 r7:eb881e60 r6:85717800 r5:84c99800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857260c0 INFO: task kworker/0:853:5376 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a1930000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:854:5377 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:854 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb995d84 r8:00000002 r7:60000013 r6:eb995d8c r5:84c9a400 r4:84c9a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85726000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a38c r4:8578a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578a38c r4:85717880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9a400 r8:857178ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717880 r8:8027f5e8 r7:eb969e60 r6:85717900 r5:84c9a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857260c0 INFO: task kworker/0:854:5377 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a20cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r4:84faa640 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:85728000 r4:85728000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85728000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85726440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85728000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a78c r4:8578a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578a78c r4:85717980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85728000 r8:857179ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717980 r8:8027f5e8 r7:eb969e60 r6:85703280 r5:85728000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85726280 INFO: task kworker/0:855:5379 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a20cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8572a400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:8572a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:00001000 r4:eb3ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8578ab8c r4:85717a00 r10:61c88647 r9:8572a400 r8:85717a2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) r4:85726580 Workqueue: events bpf_prog_free_deferred 5d20: a20cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:857:5385 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:857 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9a9d84 r8:00000002 r7:60000013 r6:eb9a9d8c r5:8572bc00 r4:8572bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8572bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857267c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8572bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578b38c r4:8578b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578b38c r4:85717a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572bc00 r8:85717aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717a80 r8:8027f5e8 r7:eb969e60 r6:85703380 r5:8572bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85726680 INFO: task kworker/0:857:5385 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a2412000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Call trace: r5:8572b000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb475000 r7:dddced80 r6:83018000 r5:8578b78c r4:85717b00 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:859:5389 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:859 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:84c9c800 r4:84c9c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85726b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb58d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8578bb8c r4:85717b80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:84c9d400 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb57d000 r5:855a578c r4:855a5400 r10:61c88647 r9:84c9d400 r8:85717cac r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717c80 r8:8027f5e8 r7:eb9a5e60 r6:85717d00 r5:84c9d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85726740 INFO: task kworker/0:860:5390 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a2d18000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:861:5393 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:5393 tgid:5393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb999d84 r8:00000002 r7:60000013 r6:eb999d8c r5:84c9e000 r4:84c9e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85726e00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579438c r4:85794000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579438c r4:85717d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9e000 r8:85717dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85726d40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bf8c r4:8578bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578bf8c r4:85717e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9ec00 r8:85717eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717e80 r8:8027f5e8 r7:eb999e60 r6:85717f00 r5:84c9ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85726b00 INFO: task kworker/0:862:5394 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a325d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Workqueue: events bpf_prog_free_deferred r5:84c9bc00 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb5e7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84c9bc00 r8:85717fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85717f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85717f80 r8:8027f5e8 r7:eb999e60 r6:84eb8000 r5:84c9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85726d00 INFO: task kworker/0:863:5397 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a32a4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:84c9b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r5:00001000 r4:eb5fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:85794b8c r4:84eb8080 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d2d0c0 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:865:5401 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:865 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9bdd84 r8:00000002 r7:60000113 r6:eb9bdd8c r5:84c98c00 r4:84c98c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c98c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d2d240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb619000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85794f8c r4:85794c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794f8c r4:84eb8180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c98c00 r8:84eb81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8180 r8:8027f5e8 r7:eb9c1e60 r6:84eb8200 r5:84c98c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2d0c0 INFO: task kworker/0:865:5401 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a3e36000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 r4:00000001 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bb000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:8471a400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb82b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a638c r4:855a6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a638c r4:85703480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471a400 r8:857034ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85703480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85703480 r8:8027f5e8 r7:eb8ede60 r6:84eb8380 r5:8471a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d5fb0 to 0xeb9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ecfb00 INFO: task kworker/1:267:5405 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a449a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:84718c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87b000 r5:85795f8c r4:85795c00 r10:61c88647 r9:84718c00 r8:84eb842c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8572e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r5:00001000 r4:eb83d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a678c r4:855a6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a678c r4:85703580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572e000 r8:857035ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85703580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85703580 r8:8027f5e8 r7:eb9d5e60 r6:85703600 r5:8572e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ecfa80 INFO: task kworker/1:268:5408 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a449a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:868:5410 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:868 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:8572ec00 r4:8572ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8572ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d2d740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8572ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e5d28 to 0xe04e5d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 task:kworker/0:869 state:D stack:0 pid:5412 tgid:5412 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb865000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85795b8c r4:85795800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85795b8c r4:84eb8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471bc00 r8:84eb852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8500 r8:8027f5e8 r7:eb9d9e60 r6:84eb8580 r5:8471bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2d780 INFO: task kworker/0:869:5412 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a4a56000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:5415 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:5415 tgid:5415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:8471c800 r4:8471c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8471c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ecfe80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8471c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a6b8c r4:855a6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a6b8c r4:85703700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ecfd40 INFO: task kworker/1:269:5415 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a4a56000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb9f1d84 r8:00000002 r7:60000113 r6:eb9f1d8c r5:8471d400 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebaf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8576878c r4:85768400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576878c r4:85703780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471d400 r8:857037ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85703780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85703780 r8:8027f5e8 r7:eb9e9e60 r6:84eb8680 r5:8471d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ecf840 INFO: task kworker/1:270:5416 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a4eb9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:5418 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:5418 tgid:5418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb9f5d84 r8:00000002 r7:60000013 r6:eb9f5d8c r5:8471e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r5:00001000 r4:eb899000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:870 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85726e40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8471ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579638c r4:85796000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579638c r4:84eb8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471ec00 r8:84eb87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8780 r8:8027f5e8 r7:eb9d9e60 r6:84eb8800 r5:8471ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2dec0 INFO: task kworker/0:870:5422 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a5474000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 task:kworker/0:871 state:D stack:0 pid:5423 tgid:5423 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eec240 r5:00001000 r4:eb8ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579678c r4:85796400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579678c r4:84eb8880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748000 r8:84eb88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8880 r8:8027f5e8 r7:eb9f9e60 r6:84eb8900 r5:85748000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2d440 INFO: task kworker/0:871:5423 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a569e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e04e5dc0 r5:00001000 r4:dfecf000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:272:5425 blocked for more than 469 seconds. r4:85749800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67d000 r5:857ab38c r4:857ab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:872:5427 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:872 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba01d84 r8:00000002 r7:60000113 r6:eba01d8c r5:8574a400 r4:8574a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eec400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8574a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85796b8c r4:85796800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85796b8c r4:84eb8a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574a400 r8:84eb8a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8a00 r8:8027f5e8 r7:eb9fde60 r6:84eb8a80 r5:8574a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec200 INFO: task kworker/0:872:5427 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a5f74000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8579778c r4:85797400 r10:61c88647 r9:8574b000 r8:84eb8b2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec3c0 INFO: task kworker/0:873:5430 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a5f74000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:874:5431 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8574bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r5:00001000 r4:eb8c9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8572c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 r5:00001000 r4:eb8d5000 r7:dddced80 r6:83018000 r5:8579738c r4:84eb8d00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba0dfb0 to 0xeba0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec4c0 INFO: task kworker/0:875:5432 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a618e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:876:5436 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba29d84 r8:00000002 r7:60000113 r6:eba29d8c r5:8572d400 r4:8572d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8572d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8572d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r5:00001000 r4:eba1b000 r5:85797b8c r4:85797800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85797b8c r4:84eb8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572d400 r8:84eb8dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8d80 r8:8027f5e8 r7:eb9d1e60 r6:85703980 r5:8572d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec800 INFO: task kworker/0:876:5436 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a6913000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:855f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 r5:00001000 r4:eba21000 r5:85797f8c r4:85797c00 r10:61c88647 r9:855f8c00 r8:84eb8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:5439 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba41d84 r8:00000002 r7:60000013 r6:eba41d8c r5:855f9800 r4:855f9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eecc00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a038c r4:857a0000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a038c r4:84eb8e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f9800 r8:84eb8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8e80 r8:8027f5e8 r7:eba35e60 r6:85703a80 r5:855f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: a6b61000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:879 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df52c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a1b8c r4:857a1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a1b8c r4:84eb8f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fb000 r8:84eb8f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8f00 r8:8027f5e8 r7:eba41e60 r6:85703b00 r5:855fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eecc40 INFO: task kworker/0:879:5441 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a6b61000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eecd40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a078c r4:857a0400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a078c r4:84eb8f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fbc00 r8:84eb8fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eb8f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8f80 r8:8027f5e8 r7:eba49e60 r6:85703b80 r5:855fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eecc40 INFO: task kworker/0:880:5442 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eba5b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:882:5446 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:882 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba6dd84 r8:00000002 r7:60000113 r6:eba6dd8c r5:855f8000 r4:855f8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855f8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d2d980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba61000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a0f8c r4:857a0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a0f8c r4:84c47080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f8000 r8:84c470ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47080 r8:8027f5e8 r7:eba49e60 r6:85703c80 r5:855f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba6dfb0 to 0xeba6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d2df80 INFO: task kworker/0:882:5446 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a6fac000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:5448 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba75d84 r8:00000002 r7:60000013 r6:eba75d8c r5:855fe000 r4:855fe000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855fe000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eba77000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeba75fb0 to 0xeba75ff8) r4:84d2df80 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fd400 r8:84c471ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47180 r8:8027f5e8 r7:eba49e60 r6:85703d80 r5:855fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df5280 INFO: task kworker/0:884:5451 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a78f2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:5453 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba9dd84 r8:00000002 r7:60000013 r6:eba9dd8c r5:85728c00 r4:85728c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eba95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:886:5455 blocked for more than 470 seconds. r4:855fa400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8b8c r4:857a8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a8b8c r4:84c47280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fa400 r8:84c472ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47280 r8:8027f5e8 r7:eba9de60 r6:85703e80 r5:855fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa9fb0 to 0xebaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df53c0 INFO: task kworker/0:886:5455 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a798e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ebaab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebab1000 r5:857a278c r4:857a2400 r4:84c47380 1fa0: 00000000 00000000 00000000 00000000 r4:84df5780 INFO: task kworker/0:888:5458 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a7d2d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:5460 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:85600c00 r4:85600c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85600c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df5740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85600c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a2b8c r4:857a2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a2b8c r4:84c47400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85600c00 r8:84c4742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47400 r8:8027f5e8 r7:ebaa9e60 r6:84dba000 r5:85600c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df5800 INFO: task kworker/0:889:5460 is blocked on a mutex likely owned by task kworker/0:188:3724. Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df5840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85602400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebacd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a2f8c r4:857a2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a2f8c r4:84c47480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85602400 r8:84c474ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47480 r8:8027f5e8 r7:ebaa9e60 r6:84dba080 r5:85602400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df5a40 INFO: task kworker/0:890:5462 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a807c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85603000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:00001000 r4:ebae3000 r7:dddced80 r6:83018000 r5:857a338c r4:84c47500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a8767000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:892:5466 blocked for more than 470 seconds. r4:85603c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85603c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df5b80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85603c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a378c r4:857a3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a378c r4:84c47580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df5c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85604800 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a3b8c r4:857a3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a3b8c r4:84c47600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85604800 r8:84c4762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47600 r8:8027f5e8 r7:ebaa9e60 r6:84dba200 r5:85604800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb09fb0 to 0xebb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df5b00 INFO: task kworker/0:893:5468 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a8bc9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:894:5470 blocked for more than 470 seconds. Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8574c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 r5:00001000 r4:ebb05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a3f8c r4:857a3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a3f8c r4:84c47680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574c800 r8:84c476ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47680 r8:8027f5e8 r7:ebaa9e60 r6:84c47700 r5:8574c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df5c80 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0476000 r5:857a838c r4:857a8000 r4:84c47780 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e04e5dc0 r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:896:5474 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:896 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb15d84 r8:00000002 r7:60000113 r6:ebb15d8c r5:8574ec00 r4:8574ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c2140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8574ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab07000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a878c r4:857a8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a878c r4:84c47880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574ec00 r8:84c478ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47880 r8:8027f5e8 r7:ebaa9e60 r6:84c47900 r5:8574ec00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:857c2100 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:898:5479 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:898 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb19d84 r8:00000002 r7:60000013 r6:ebb19d8c r5:85748c00 r4:85748c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85748c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c2480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85748c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb131000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8f8c r4:857a8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a8f8c r4:84c47a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748c00 r8:84c47aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47a80 r8:8027f5e8 r7:eba11e60 r6:84c47b00 r5:85748c00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb323000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a978c r4:857a9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a978c r4:84c47b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84719800 r8:84c47bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47b80 r8:8027f5e8 r7:eba11e60 r6:84c47c00 r5:84719800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857c2580 INFO: task kworker/0:899:5481 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: a992c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:900 state:D stack:0 pid:5483 tgid:5483 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb36d000 r5:857a9b8c r4:857a9800 r4:84c47c80 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:5485 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb25d84 r8:00000002 r7:60000013 r6:ebb25d8c r5:84e50000 r4:84e50000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e50000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08 r4:00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857a9f8c r4:84c47d80 Exception stack(0xebb25fb0 to 0xebb25ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 task:kworker/0:902 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb4e1000 r7:dddced80 r6:83018000 r5:857aa38c r4:84c47e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47e80 r8:8027f5e8 r7:ebb25e60 r6:84c47f00 r5:84e50c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857c29c0 INFO: task kworker/0:902:5487 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: aa23d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb31d84 r8:00000002 r7:60000013 r6:ebb31d8c r5:84e51800 r4:84e51800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e51800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df5f80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e51800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857aab8c r4:857aa800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aab8c r4:84c47f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e51800 r8:84c47fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c47f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c47f80 r8:8027f5e8 r7:ebb2de60 r6:857d3000 r5:84e51800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857c2d80 INFO: task kworker/0:903:5489 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:904:5490 blocked for more than 470 seconds. task:kworker/0:904 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb29d84 r8:00000002 r7:60000113 r6:ebb29d8c r5:84e52400 r4:84e52400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e52400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c2cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e52400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:857c2e80 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb6c3000 r5:857abb8c r4:857ab800 r4:857d3180 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857c2f40 INFO: task kworker/0:905:5493 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: aa8ed000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:906:5494 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:906 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84e54800 r8:857d32ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:907:5497 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:907 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb45d84 r8:00000002 r7:60000113 r6:ebb45d8c r5:84e55400 r4:84e55400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e55400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e55400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ab78c r4:857ab400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ab78c r4:857d3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e55400 r8:857d33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d3380 r8:8027f5e8 r7:ebb39e60 r6:857d3400 r5:84e55400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:857d74c0 Workqueue: events bpf_prog_free_deferred 5d20: aad37000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebb91000 r7:ddde2d80 r6:83018200 r5:855a778c r4:84dba280 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:5502 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb49d84 r8:00000002 r7:60000113 r6:ebb49d8c r5:847d0000 r4:847d0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d79c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857abf8c r4:857abc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857abf8c r4:857d3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d0000 r8:857d352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d3500 r8:8027f5e8 r7:ebb39e60 r6:857d3580 r5:847d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7800 INFO: task kworker/0:908:5502 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: ab175000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b438c r4:857b4000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b438c r4:857d3600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d1800 r8:857d362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d3600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d3600 r8:8027f5e8 r7:ebb49e60 r6:857d3680 r5:847d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb55fb0 to 0xebb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7900 INFO: task kworker/0:909:5504 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ab4e6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:847d0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df5f00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb733000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:857d7b80 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:911:5507 blocked for more than 470 seconds. r5:847d3000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb71f000 r5:857b478c r4:857b4400 r10:61c88647 r9:847d3000 r8:857d382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7b80 INFO: task kworker/0:911:5507 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ab8b3000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:847d3c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eec100 r5:00001000 r4:eb757000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:5512 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb41d84 r8:00000002 r7:60000113 r6:ebb41d8c r5:847d4800 r4:847d4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d8000 r5:00001000 r4:eb76b000 r5:857b538c r4:857b5000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb781000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:857d8140 Call trace: Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:915:5516 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:915 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb61d84 r8:00000002 r7:60000113 r6:ebb61d8c r5:847d6000 r4:847d6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d8340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb795000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b5b8c r4:857b5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b5b8c r4:857d3c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d6000 r8:857d3c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d3c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d3c00 r8:8027f5e8 r7:ebb35e60 r6:857d3c80 r5:847d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d8180 INFO: task kworker/0:915:5516 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:e04e5dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:5518 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:5518 tgid:5518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb69d84 r8:00000002 r7:60000113 r6:ebb69d8c r5:847d6c00 r4:847d6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d8640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb973000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b638c r4:857b6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b638c r4:857d3d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d6c00 r8:857d3d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d3d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d3d00 r8:8027f5e8 r7:ebb61e60 r6:857d3d80 r5:847d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d8280 INFO: task kworker/0:916:5518 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ac4b8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:847d2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 r5:00001000 r4:eb8dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:5522 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb71d84 r8:00000002 r7:60000013 r6:ebb71d8c r5:84e56000 r4:84e56000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e56000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d8900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e56000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b6b8c r4:857b6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b6b8c r4:857d3f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e56000 r8:857d3f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d3f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d3f00 r8:8027f5e8 r7:ebb69e60 r6:857d3f80 r5:84e56000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d8580 INFO: task kworker/0:918:5522 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r4:85606c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d8800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85606c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb985000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b678c r4:857b6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b678c r4:857e0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85606c00 r8:857e002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0000 r8:8027f5e8 r7:ebb71e60 r6:84dba300 r5:85606c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d8580 INFO: task kworker/0:919:5523 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:5526 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:85606000 r4:85606000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85606000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r4:e04e5dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/0:921:5527 blocked for more than 470 seconds. r4:855fec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r9:83018005 r8:855fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb8b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b6f8c r4:857b6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b6f8c r4:857e0100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fec00 r8:857e012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0100 r8:8027f5e8 r7:ebb95e60 r6:84dba400 r5:855fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d8880 INFO: task kworker/0:921:5527 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: acc4e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:5529 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:5529 tgid:5529 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:ebba1d84 r8:00000002 r7:60000113 r6:ebba1d8c r5:85605400 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebbb3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:857d8a00 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Call trace: r5:85608000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebbad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855a7b8c r4:84dba500 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e5d28 to 0xe04e5d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb805000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a7f8c r4:855a7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a7f8c r4:84dba600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85608c00 r8:84dba62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dba600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dba600 r8:8027f5e8 r7:eb9f1e60 r6:84dba680 r5:85608c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ce800 INFO: task kworker/1:275:5534 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ad454000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:8560a400 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebbb9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:5538 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:8560bc00 r4:8560bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r5:00001000 r4:eab81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ad83d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:5540 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba55d84 r8:00000002 r7:60000113 r6:eba55d8c r5:8560c800 r4:8560c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560c800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b7f8c r4:857b7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b7f8c r4:857e0300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560c800 r8:857e032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0300 r8:8027f5e8 r7:eba25e60 r6:84dba800 r5:8560c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d8a00 INFO: task kworker/0:925:5540 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: adb04000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:5542 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba71d84 r8:00000002 r7:60000113 r6:eba71d8c r5:8560b000 r4:8560b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bc38c r4:857bc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bc38c r4:857e0380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560b000 r8:857e03ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0380 r8:8027f5e8 r7:eba25e60 r6:84dba880 r5:8560b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb140 INFO: task kworker/0:926:5542 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: adcf5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:5543 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba81d84 r8:00000002 r7:60000013 r6:eba81d8c r5:85609800 r4:85609800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85609800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85609800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bcf8c r4:857bcc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bcf8c r4:857e0400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85609800 r8:857e042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0400 r8:8027f5e8 r7:eba25e60 r6:84dba900 r5:85609800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb140 INFO: task kworker/0:927:5543 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: adcf5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:5545 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:5545 tgid:5545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb65d84 r8:00000002 r7:60000113 r6:ebb65d8c r5:84e53000 r4:84e53000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e53000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e53000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bcb8c r4:857bc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bcb8c r4:857e0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e53000 r8:857e04ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0480 r8:8027f5e8 r7:eba81e60 r6:857e0500 r5:84e53000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb1c0 INFO: task kworker/0:928:5545 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ae0cf000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:5548 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba99d84 r8:00000002 r7:60000113 r6:eba99d8c r5:85729800 r4:85729800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85729800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85729800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bd78c r4:857bd400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bd78c r4:857e0580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85729800 r8:857e05ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0580 r8:8027f5e8 r7:eba81e60 r6:857e0600 r5:85729800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb6c0 INFO: task kworker/0:929:5548 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ae0cf000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:5549 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:5549 tgid:5549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:84fb0000 r4:84fb0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:84fb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:00001000 r4:eb123000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857e0680 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb6c0 INFO: task kworker/0:930:5549 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ae0cf000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:5552 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:84fb0c00 r4:84fb0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bdb8c r4:857bd800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bdb8c r4:857e0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb0c00 r8:857e07ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0780 r8:8027f5e8 r7:eba99e60 r6:857e0800 r5:84fb0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb740 INFO: task kworker/0:931:5552 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ae778000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:5556 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:84fb1800 r4:84fb1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ebac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb471000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857be38c r4:857be000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857be38c r4:857e0880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb1800 r8:857e08ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0880 r8:8027f5e8 r7:ebab9e60 r6:857e0900 r5:84fb1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb980 INFO: task kworker/0:932:5556 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ae8b2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:5557 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebbbdd84 r8:00000002 r7:60000113 r6:ebbbdd8c r5:84fb2400 r4:84fb2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eba00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fb2400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb447000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bdf8c r4:857bdc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bdf8c r4:857e0980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb2400 r8:857e09ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0980 r8:8027f5e8 r7:ebac5e60 r6:857e0a00 r5:84fb2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbbdfb0 to 0xebbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb980 INFO: task kworker/0:933:5557 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ae8b2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb57f000 r5:857be78c r4:857be400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:934:5558 is blocked on a mutex likely owned by task kworker/0:188:3724. r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: aece0000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:5560 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:5560 tgid:5560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebafdd84 r8:00000002 r7:60000113 r6:ebafdd8c r5:84fb4800 r4:84fb4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857bef8c r4:857e0b80 Exception stack(0xebafdfb0 to 0xebafdff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc9e08 r5:00001000 r4:eb595000 r7:dddced80 r6:83018000 r5:857beb8c r4:857e0c80 Exception stack(0xebbc9fb0 to 0xebbc9ff8) Call trace: 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:5564 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:5564 tgid:5564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebbd5d84 r8:00000002 r7:60000113 r6:ebbd5d8c r5:85612400 r4:85612400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85612400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb5f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85612400 r8:857e0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85800100 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb61f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:939:5567 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebbe5d84 r8:00000002 r7:60000013 r6:ebbe5d8c r5:85613c00 r4:85613c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858005c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85613c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb641000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bfb8c r4:857bf800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bfb8c r4:857e0e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:857e0eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0e80 r8:8027f5e8 r7:ebbe1e60 r6:84dbaa80 r5:85613c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85800300 INFO: task kworker/0:939:5567 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: af938000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85614800 r4:00000000 r9:83018005 r8:85614800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857e0f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0f00 r8:8027f5e8 r7:ebbe5e60 r6:84dbab00 r5:85614800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe9fb0 to 0xebbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85800500 INFO: task kworker/0:940:5570 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: afd33000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb83f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506038c r4:85060000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506038c r4:857e0f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85615400 r8:857e0fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e0f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e0f80 r8:8027f5e8 r7:ebbe9e60 r6:84dbac00 r5:85615400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf1fb0 to 0xebaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85800780 INFO: task kworker/0:941:5572 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8ad000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebbd1fb0 to 0xebbd1ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:dfecf000 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) task:kworker/0:942 state:D stack:0 pid:5577 tgid:5577 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb883000 r5:85060b8c r4:85060800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85060b8c r4:857fe000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85611800 r8:857fe02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fe000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fe000 r8:8027f5e8 r7:ebbe9e60 r6:84dbad00 r5:85611800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf1fb0 to 0xebbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85800940 INFO: task kworker/0:942:5577 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b02dc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:5580 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8560e000 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8560e000 r8:857fe0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85800ac0 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc01d84 r8:00000002 r7:60000113 r6:ebc01d8c r5:8560d400 r4:8560d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560d400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb897000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85060f8c r4:85060c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85060f8c r4:857fe100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560d400 r8:857fe12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fe100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fe100 r8:8027f5e8 r7:ebbfde60 r6:84dbae00 r5:8560d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc01fb0 to 0xebc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85800c00 INFO: task kworker/0:944:5581 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b0829000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84fb6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r5:00001000 r4:eb8c1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebbcdfb0 to 0xebbcdff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85610000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d49f8c r4:84d49c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d49f8c r4:84dbae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:84dbaeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dbae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dbae80 r8:8027f5e8 r7:eb9f1e60 r6:84dbaf00 r5:85610000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc05fb0 to 0xebc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508a100 INFO: task kworker/1:277:5584 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b0b7f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:946:5587 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:857ec9c0 Call trace: r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b108a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8560ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ec800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85061b8c r4:85061800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85061b8c r4:857fe300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560ec00 r8:857fe32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fe300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fe300 r8:8027f5e8 r7:ebc11e60 r6:8506d000 r5:8560ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc15fb0 to 0xebc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ec9c0 INFO: task kworker/0:947:5588 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:948:5590 blocked for more than 471 seconds. r5:84fb6c00 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84fb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85061f8c r4:85061c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85061f8c r4:857fe380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb6c00 r8:857fe3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fe380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fe380 r8:8027f5e8 r7:ebc11e60 r6:857fe400 r5:84fb6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85800fc0 INFO: task kworker/0:948:5590 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b1492000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Not tainted 6.15.0-syzkaller #0 r4:84fb3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08 r5:00001000 r4:eba19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8506238c r4:85062000 r10:61c88647 r9:84fb3c00 r8:857fe4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506e080 Call trace: 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:950:5595 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:950 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc1dd84 r8:00000002 r7:60000013 r6:ebc1dd8c r5:85810000 r4:85810000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85810000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eba3b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85062b8c r4:857fe580 Exception stack(0xebc1dfb0 to 0xebc1dff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ea6f8c r4:84ea6c00 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ebbedd84 r8:00000002 r7:60000013 r6:ebbedd8c r5:85810c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eba4b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85813000 r4:00000000 r9:83018005 r8:85813000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r5:00001000 r4:eba89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506378c r4:85063400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506378c r4:857fe780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85813000 r8:857fe7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fe780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fe780 r8:8027f5e8 r7:ebbede60 r6:857fe800 r5:85813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506e500 INFO: task kworker/0:952:5599 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b1d6f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:5601 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba79000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8506338c r4:85063000 r4:857fe880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:5603 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc2dd84 r8:00000002 r7:60000113 r6:ebc2dd8c r5:85811800 r4:85811800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85811800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85811800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaaf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d49b8c r4:84d49800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d49b8c r4:8506d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85811800 r8:8506d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d080 r8:8027f5e8 r7:eb9f1e60 r6:857fe980 r5:85811800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:278:5603 is blocked on a mutex likely owned by task kworker/0:188:3724. 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:954:5605 blocked for more than 471 seconds. r4:85815400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r5:00001000 r4:ebb0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85815400 r8:857fea2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b2549000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:5607 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85816000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebaa3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:279 state:D stack:0 pid:5609 tgid:5609 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b2cc6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:956:5611 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:956 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc35d84 r8:00000002 r7:60000113 r6:ebc35d8c r5:85861800 r4:85861800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85861800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d8f80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85861800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85063f8c r4:85063c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85063f8c r4:857fec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85861800 r8:857fec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fec00 r8:8027f5e8 r7:ebc39e60 r6:8506d200 r5:85861800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc35fb0 to 0xebc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506efc0 INFO: task kworker/0:956:5611 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) task:kworker/1:280 state:D stack:0 pid:5613 tgid:5613 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85862400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead13000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85768f8c r4:85768c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85768f8c r4:8506d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85862400 r8:8506d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d280 r8:8027f5e8 r7:eb9f1e60 r6:8506d300 r5:85862400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc41fb0 to 0xebc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508ac40 INFO: task kworker/1:280:5613 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b30e7000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb31b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85863000 r8:8506d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:957:5616 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:957 state:D stack:0 pid:5616 tgid:5616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc4dd84 r8:00000002 r7:60000113 r6:ebc4dd8c r5:85816c00 r4:85816c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85816c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85801a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85816c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb87000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcc78c r4:84fcc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcc78c r4:857fec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85816c00 r8:857fecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fec80 r8:8027f5e8 r7:ebc39e60 r6:857fed00 r5:85816c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc4dfb0 to 0xebc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506ef00 INFO: task kworker/0:957:5616 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:84fab400 r4:00000001 INFO: task kworker/1:282:5621 blocked for more than 471 seconds. r4:85865400 r4:00000000 r4:00000000 r5:00001000 r4:eb189000 r5:8576938c r4:85769000 r4:8506d480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:5622 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebb85d84 r8:00000002 r7:60000013 r6:ebb85d8c r5:85866000 r4:85866000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85866000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85866000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85769f8c r4:85769c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85769f8c r4:8506d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85866000 r8:8506d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d580 r8:8027f5e8 r7:ebc45e60 r6:8506d600 r5:85866000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508a300 INFO: task kworker/1:283:5622 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b366b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:284:5623 blocked for more than 471 seconds. task:kworker/1:284 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc51d84 r8:00000002 r7:60000113 r6:ebc51d8c r5:85863c00 r4:85863c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85863c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85863c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85769b8c r4:85769800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85769b8c r4:8506d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85863c00 r8:8506d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d680 r8:8027f5e8 r7:ebb85e60 r6:8506d700 r5:85863c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc51fb0 to 0xebc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e780 INFO: task kworker/1:284:5623 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b39e0000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:5626 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc55d84 r8:00000002 r7:60000013 r6:ebc55d8c r5:85864800 r4:85864800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85864800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85864800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb537000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576a78c r4:8576a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576a78c r4:8506d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8506d780 r8:8027f5e8 r7:ebb85e60 r6:8506d800 r5:85864800 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b3e47000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ebc59d84 r8:00000002 r7:60000113 r6:ebc59d8c r5:85616c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb50d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85616c00 r8:8506d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8505a380 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:5630 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc5dd84 r8:00000002 r7:60000013 r6:ebc5dd8c r5:85868000 r4:85868000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85868000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85868000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576ab8c r4:8576a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576ab8c r4:8506d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85868000 r8:8506d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d980 r8:8027f5e8 r7:ebc55e60 r6:8506da00 r5:85868000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc5dfb0 to 0xebc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505a740 INFO: task kworker/1:287:5630 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85869800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ad00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85869800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb727000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576bb8c r4:8576b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576bb8c r4:8506da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85869800 r8:8506daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506da80 r10:00000000 r9:8506da80 r8:8027f5e8 r7:ebc5de60 r6:8506db00 r5:85869800 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85813c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb69f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85813c00 r8:8506dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505a9c0 INFO: task kworker/1:289:5634 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b462f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:5636 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:ebc71d84 r8:00000002 r7:60000013 r6:ebc71d8c r5:85814800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ab80 r5:00001000 r4:eb6eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8576b38c r4:8506dc00 Exception stack(0xebc71fb0 to 0xebc71ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:291 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:84e70000 r4:84e70000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e70000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ac80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e70000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb709000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576b78c r4:8576b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576b78c r4:8506dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e70000 r8:8506dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506dc80 r8:8027f5e8 r7:ebc65e60 r6:857fee80 r5:84e70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505a900 INFO: task kworker/1:291:5637 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84faa640 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc7de08 r5:00001000 r4:eb74d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b4f5e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:5642 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc81d84 r8:00000002 r7:60000013 r6:ebc81d8c r5:84e72400 r4:84e72400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb771000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:5644 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:84e73000 r4:84e73000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e73000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504d240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e73000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb793000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577038c r4:85770000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577038c r4:8506de00 r4:8506de00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:295 state:D stack:0 pid:5646 tgid:5646 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84e73c00 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb92b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8506de80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:295:5646 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b5707000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:5648 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc8dd84 r8:00000002 r7:60000013 r6:ebc8dd8c r5:84e74800 r4:84e74800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e74800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504d4c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e74800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85770b8c r4:85770800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85770b8c r4:8506df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e74800 r8:8506df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506df00 r8:8027f5e8 r7:ebc89e60 r6:85806100 r5:84e74800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc8dfb0 to 0xebc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:297:5650 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ebc91d84 r8:00000002 r7:60000013 r6:ebc91d8c r5:84e75400 r4:84e75400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e75400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc91e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e75400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcd78c r4:84fcd400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fcd78c r4:8506df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e75400 r8:8506dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506df80 r8:8027f5e8 r7:ebc8de60 r6:85806180 r5:84e75400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc91fb0 to 0xebc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504d440 INFO: task kworker/1:297:5650 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b59bf000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:5651 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc79d84 r8:00000002 r7:60000013 r6:ebc79d8c r5:8586bc00 r4:8586bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504da00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:00001000 r4:ebbb1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85770f8c r4:85064000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586bc00 r8:8506402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064000 r8:8027f5e8 r7:ebc91e60 r6:85064080 r5:8586bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504d440 INFO: task kworker/1:298:5651 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b5dee000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:5653 blocked for more than 472 seconds. r10:82918930 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:8586c800 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebb8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:5655 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc49d84 r8:00000002 r7:60000113 r6:ebc49d8c r5:84e76000 r4:84e76000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e76000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e76000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcdb8c r4:84fcd800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcdb8c r4:85806280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e76000 r8:858062ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebc49fb0 to 0xebc49ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:5656 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:5656 tgid:5656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebc95d84 r8:00000002 r7:60000113 r6:ebc95d8c r5:84e76c00 r4:84e76c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e76c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85801dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fccf8c r4:84fccc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fccf8c r4:85806380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e76c00 r8:858063ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806380 r8:8027f5e8 r7:ebc49e60 r6:85806400 r5:84e76c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc95fb0 to 0xebc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85801b80 INFO: task kworker/0:960:5656 is blocked on a mutex likely owned by task kworker/0:188:3724. r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:5659 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebca1d84 r8:00000002 r7:60000113 r6:ebca1d8c r5:84e70c00 r4:84e70c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e70c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcd38c r4:84fcd000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcd38c r4:85806480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e70c00 r8:858064ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806480 r8:8027f5e8 r7:ebc49e60 r6:85806500 r5:84e70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca1fb0 to 0xebca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85801d80 INFO: task kworker/0:961:5659 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b661e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:299:5661 blocked for more than 472 seconds. task:kworker/1:299 state:D stack:0 pid:5661 tgid:5661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85818000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504db80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85818000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577138c r4:85771000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577138c r4:85064180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818000 r8:850641ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064180 r8:8027f5e8 r7:ebc91e60 r6:85806580 r5:85818000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504dcc0 INFO: task kworker/1:299:5661 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b6ae4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:5665 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:ebcc5d84 r8:00000002 r7:60000113 r6:ebcc5d8c r5:8586d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08 r9:83018205 r8:8586d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 r5:00001000 r4:ec501000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebcc5fb0 to 0xebcc5ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:962:5667 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:962 state:D stack:0 pid:5667 tgid:5667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebcd1d84 r8:00000002 r7:60000113 r6:ebcd1d8c r5:8586a400 r4:8586a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcdf8c r4:84fcdc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcdf8c r4:85806600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586a400 r8:8580662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806600 r8:8027f5e8 r7:ebc49e60 r6:85064380 r5:8586a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd1fb0 to 0xebcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fd24c0 INFO: task kworker/0:962:5667 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b6e13000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:5668 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:5668 tgid:5668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:8586e000 r4:8586e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce3000 r5:8577178c r4:85771400 r10:61c88647 r9:8586e000 r8:8506432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:963 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eac0f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85806680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806680 r8:8027f5e8 r7:ebcd1e60 r6:85064480 r5:85868c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fd24c0 INFO: task kworker/0:963:5670 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b72b2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:964:5671 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:964 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebce1d84 r8:00000002 r7:60000113 r6:ebce1d8c r5:85860c00 r4:85860c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85860c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaeb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fce78c r4:84fce400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fce78c r4:85806700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85860c00 r8:8580672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806700 r8:8027f5e8 r7:ebcdde60 r6:85064500 r5:85860c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce1fb0 to 0xebce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fd24c0 INFO: task kworker/0:964:5671 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b77b2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85070040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85771b8c r4:85771800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85771b8c r4:85064580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586ec00 r8:850645ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064580 r8:8027f5e8 r7:ebcc5e60 r6:85064600 r5:8586ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf5fb0 to 0xebcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:5676 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:5676 tgid:5676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:8586b000 r4:8586b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85070280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85771f8c r4:85771c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85771f8c r4:85064680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586b000 r8:850646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064680 r8:8027f5e8 r7:ebcc5e60 r6:85064700 r5:8586b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec505fb0 to 0xec505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85070240 INFO: task kworker/1:303:5676 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r5:00001000 r4:ec50b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85064780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec511000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85871800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca9e08 r5:00001000 r4:ec51b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85871800 r8:850649ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:5684 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec519d84 r8:00000002 r7:60000013 r6:ec519d8c r5:85872400 r4:85872400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85872400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85070a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85872400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec521000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577338c r4:85773000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577338c r4:85064a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85872400 r8:85064aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064a80 r8:8027f5e8 r7:ebca9e60 r6:85064b00 r5:85872400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec519fb0 to 0xec519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:307:5684 is blocked on a mutex likely owned by task kworker/0:188:3724. Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r4:00000000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:308 state:D stack:0 pid:5686 tgid:5686 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85873000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85064b80 Exception stack(0xec525fb0 to 0xec525ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b87bb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:5688 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:5688 tgid:5688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec52dd84 r8:00000002 r7:60000013 r6:ec52dd8c r5:85873c00 r4:85873c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85873c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec52de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec549000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec52dfb0 to 0xec52dff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:310 state:D stack:0 pid:5690 tgid:5690 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85874800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85070d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85874800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec535000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85773b8c r4:85773800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85773b8c r4:85064d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85874800 r8:85064dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064d80 r8:8027f5e8 r7:ec52de60 r6:85064e00 r5:85874800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec539fb0 to 0xec539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85070d40 INFO: task kworker/1:310:5690 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b8b22000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:311 state:D stack:0 pid:5692 tgid:5692 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ec543000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:5694 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:5694 tgid:5694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec54dd84 r8:00000002 r7:60000113 r6:ec54dd8c r5:85876000 r4:85876000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85876000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec54de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85876000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec553000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577c78c r4:8577c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577c78c r4:85064f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876000 r8:85064fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85064f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85064f80 r8:8027f5e8 r7:ec52de60 r6:85805000 r5:85876000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec54dfb0 to 0xec54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507e200 INFO: task kworker/1:312:5694 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b928d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85876c00 r5:85876c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec55de08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85876c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec561000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577cb8c r4:8577c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577cb8c r4:85805100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876c00 r8:8580512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85805100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85805100 r8:8027f5e8 r7:ec54de60 r6:85805180 r5:85876c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec55dfb0 to 0xec55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507e400 INFO: task kworker/1:313:5696 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b928d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:5697 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec581d84 r8:00000002 r7:60000013 r6:ec581d8c r5:85878000 r4:85878000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85878000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec56f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577cf8c r4:8577cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85805080 r8:8027f5e8 r7:ec55de60 r6:85805200 r5:85878000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: b928d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 INFO: task kworker/1:315:5700 blocked for more than 472 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec57de08 r5:00001000 r4:ec589000 r7:ddde2d80 r6:83018200 r5:8577d38c r4:85805280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:dfecf000 r4:84fab400 INFO: task kworker/1:316:5702 blocked for more than 472 seconds. r4:00000000 r5:00001000 r4:ec597000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577d78c r4:8577d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577d78c r4:85805400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85879800 r8:8580542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85805400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85805400 r8:8027f5e8 r7:ec57de60 r6:85805480 r5:85879800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507e600 INFO: task kworker/1:316:5702 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:800f0013 r4:80239bb0 r5:00001000 r4:dfecf000 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:5705 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:5705 tgid:5705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec585d84 r8:00000002 r7:60000113 r6:ec585d8c r5:8587b000 r4:8587b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec585e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ea00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577db8c r4:8577d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577db8c r4:85805580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587b000 r8:858055ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:dfecf000 r4:84fab400 r4:84faa640 r10:82918930 r9:ebc09d84 r8:00000002 r7:60000113 r6:ebc09d8c r5:8587c800 r4:00000000 r5:00001000 r4:ec815000 r4:85805680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:965:5711 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:965 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5b1d84 r8:00000002 r7:60000113 r6:ec5b1d8c r5:8587d400 r4:8587d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858013c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8587d400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcf38c r4:84fcf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcf38c r4:85806780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587d400 r8:858067ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806780 r8:8027f5e8 r7:ebcdde60 r6:85805780 r5:8587d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b1fb0 to 0xec5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fd2bc0 INFO: task kworker/0:965:5711 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:966 state:D stack:0 pid:5712 tgid:5712 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b5e08 r9:83018005 r8:8587e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8587e000 r8:8580682c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:967:5716 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:967 state:D stack:0 pid:5716 tgid:5716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5c1d84 r8:00000002 r7:60000113 r6:ec5c1d8c r5:85880000 r4:85880000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85880000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85880000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcff8c r4:84fcfc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcff8c r4:85806880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85880000 r8:858068ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806880 r8:8027f5e8 r7:ec5b1e60 r6:85805880 r5:85880000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857f40c0 INFO: task kworker/0:967:5716 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:968 state:D stack:0 pid:5717 tgid:5717 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84fcf78c r4:85806900 r10:00000000 r9:85806900 r8:8027f5e8 r7:ec5c1e60 r6:85805900 r5:85880c00 r4:857f40c0 Call trace: 5d20: ba8db000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:e04e5dc0 r5:00001000 r4:dfecf000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:969 state:D stack:0 pid:5719 tgid:5719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5cdd84 r8:00000002 r7:60000113 r6:ec5cdd8c r5:85882400 r4:85882400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85882400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f41c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85882400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb449000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fcfb8c r4:84fcf800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcfb8c r4:85806980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85882400 r8:858069ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806980 r8:8027f5e8 r7:ec5c1e60 r6:85805980 r5:85882400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5cdfb0 to 0xec5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857f4300 INFO: task kworker/0:969:5719 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ba8db000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:85883000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84fac38c r4:85806a00 r10:00000000 r9:85806a00 r8:8027f5e8 r7:ec5c1e60 r6:85805a00 r5:85883000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:5722 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:971 state:D stack:0 pid:5722 tgid:5722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5d9d84 r8:00000002 r7:60000013 r6:ec5d9d8c r5:85881800 r4:85881800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85881800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85881800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4ab8c r4:84d4a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84d4ab8c r4:85806a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85881800 r8:85806aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806a80 r8:8027f5e8 r7:ec5d1e60 r6:85805a80 r5:85881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d9fb0 to 0xec5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857f4280 INFO: task kworker/0:971:5722 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/0:972:5725 blocked for more than 472 seconds. r5:85883c00 r4:8291892c [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85806b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 INFO: task kworker/0:973:5726 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:973 state:D stack:0 pid:5726 tgid:5726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5e5d84 r8:00000002 r7:60000113 r6:ec5e5d8c r5:85885400 r4:85885400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85885400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85885400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84facf8c r4:84facc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84facf8c r4:85806b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85885400 r8:85806bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806b80 r8:8027f5e8 r7:ec5e1e60 r6:85805b80 r5:85885400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857f4500 INFO: task kworker/0:973:5726 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bb5d7000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r4:84faa640 task:kworker/0:974 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:5731 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:5731 tgid:5731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5f1d84 r8:00000002 r7:60000013 r6:ec5f1d8c r5:85884800 r4:85884800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85884800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85884800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fae78c r4:84fae400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fae78c r4:85806c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85884800 r8:85806cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806c80 r8:8027f5e8 r7:ec5e5e60 r6:85805c80 r5:85884800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84fad38c r4:84fad000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:82918930 r9:ec5fdd84 r8:00000002 r7:60000113 r6:ec5fdd8c r5:85886c00 r4:85886c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85886c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85886c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb885000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fad78c r4:84fad400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fad78c r4:85806d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85886c00 r8:85806dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806d80 r8:8027f5e8 r7:ec5f1e60 r6:85805d80 r5:85886c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857f4a80 INFO: task kworker/0:977:5734 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bbdd6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:978:5736 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:978 state:D stack:0 pid:5736 tgid:5736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec605d84 r8:00000002 r7:60000113 r6:ec605d8c r5:85888c00 r4:85888c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85888c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec605e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85888c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fadb8c r4:84fad800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fadb8c r4:85806e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85888c00 r8:85806e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85806e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d20: bc12b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:e04e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:980:5740 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:980 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec61dd84 r8:00000002 r7:60000113 r6:ec61dd8c r5:85889800 r4:85889800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85889800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85889800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fae38c r4:84fae000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85806f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba2b000 r5:84faef8c r4:84faec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: bc653000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:982:5744 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:982 state:D stack:0 pid:5744 tgid:5744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec62dd84 r8:00000002 r7:60000113 r6:ec62dd8c r5:8588b000 r4:8588b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8588b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8588b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84faeb8c r4:84fae800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84faeb8c r4:8505d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588b000 r8:8505d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d000 r8:8027f5e8 r7:ec625e60 r6:84fa6000 r5:8588b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507d180 INFO: task kworker/0:982:5744 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:84fafb8c r4:84faf800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8505d080 r8:8027f5e8 r7:ec625e60 r6:84fa6080 r5:8588bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507d100 INFO: task kworker/0:983:5746 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bc9d8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:984:5748 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:984 state:D stack:0 pid:5748 tgid:5748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec641d84 r8:00000002 r7:60000013 r6:ec641d8c r5:8588c800 r4:8588c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8588c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8588c800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba39000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84faf38c r4:84faf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84faf38c r4:8505d100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8505d100 r8:8027f5e8 r7:ec639e60 r6:84fa6100 r5:8588c800 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r4:8588ec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d4c0 r5:84faf78c r4:84faf400 r10:61c88647 r9:8588ec00 r8:8505d1ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:986:5752 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:986 state:D stack:0 pid:5752 tgid:5752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec65dd84 r8:00000002 r7:60000113 r6:ec65dd8c r5:8588e000 r4:8588e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8588e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507db40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8588e000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa0b8c r4:84fa0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8505d200 r8:8027f5e8 r7:ec639e60 r6:84fa6200 r5:8588e000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:dfecf000 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8587ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8505d280 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:988:5756 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:988 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec66dd84 r8:00000002 r7:60000013 r6:ec66dd8c r5:85890c00 r4:85890c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85890c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85890c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba93000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa038c r4:84fa0000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa038c r4:8505d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85890c00 r8:8505d3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d380 r8:8027f5e8 r7:ec65de60 r6:84fa6300 r5:85890c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec675d84 r8:00000002 r7:60000113 r6:ec675d8c r5:85890000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84fa078c r4:84fa0400 r7:dddced80 r6:83018000 r5:84fa078c r4:8505d300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85890000 r8:8505d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d300 r8:8027f5e8 r7:ec65de60 r6:84fa6400 r5:85890000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507d8c0 INFO: task kworker/0:989:5758 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bd939000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 Exception stack(0xe04e5fb0 to 0xe04e5ff8) INFO: task kworker/1:320:5760 blocked for more than 473 seconds. r4:85891800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85891800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e38c r4:8577e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577e38c r4:84fa6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85891800 r8:84fa63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fa6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa6380 r8:8027f5e8 r7:ebc09e60 r6:84fa6480 r5:85891800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec679fb0 to 0xec679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8584f1c0 INFO: task kworker/1:320:5760 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bddbc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:990:5762 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r5:00001000 r4:ebc21000 r5:84fa178c r4:84fa1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8505d400 r8:8027f5e8 r7:ec65de60 r6:84fa6500 r5:85892400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bddbc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84fa0f8c r4:84fa0c00 r7:dddced80 r6:83018000 r5:84fa0f8c r4:8505d480 r10:00000000 r9:8505d480 r8:8027f5e8 r7:ec681e60 r6:84fa6580 r5:85893000 INFO: task kworker/0:991:5764 is blocked on a mutex likely owned by task kworker/0:188:3724. Exception stack(0xe04e5d28 to 0xe04e5d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85893c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85893c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507de40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85893c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa138c r4:84fa1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa138c r4:8505d500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85893c00 r8:8505d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d500 r8:8027f5e8 r7:ec681e60 r6:84fa6600 r5:85893c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507dc40 INFO: task kworker/0:992:5766 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: be6b0000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec6c7000 r5:84fa238c r4:84fa2000 r7:dddced80 r6:83018000 r5:84fa238c r4:8505d580 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: be6b0000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:e04e5dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85896000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85896000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec64f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa1b8c r4:84fa1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa1b8c r4:8505d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85896000 r8:8505d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d600 r8:8027f5e8 r7:ec6b5e60 r6:84fa6700 r5:85896000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85804340 INFO: task kworker/0:994:5770 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: be6b0000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85896c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r5:00001000 r4:ec68d000 r5:84fa1f8c r4:84fa1c00 r7:dddced80 r6:83018000 r5:84fa1f8c r4:8505d680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:996:5776 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:996 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5d5d84 r8:00000002 r7:60000113 r6:ec5d5d8c r5:85895400 r4:85895400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85895400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858542c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85895400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa278c r4:84fa2400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa278c r4:8505d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85895400 r8:8505d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d700 r8:8027f5e8 r7:ec6b5e60 r6:84fa6800 r5:85895400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d5fb0 to 0xec5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858542c0 INFO: task kworker/0:996:5776 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: becb7000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d5e08 r5:8508138c r4:85081000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: becb7000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:997:5779 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:997 state:D stack:0 pid:5779 tgid:5779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:858c0c00 r4:858c0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85854840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r5:84fa378c r4:84fa3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:858c0c00 r8:8505d7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6dde08 r9:83018005 r8:858c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8505d800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d800 r8:8027f5e8 r7:ec6d9e60 r6:84fa6a00 r5:858c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6ddfb0 to 0xec6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858543c0 INFO: task kworker/0:998:5780 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bf1df000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:999:5782 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:999 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:858c0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85854580 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84fa2f8c r4:84fa2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa2f8c r4:8505d880 r10:61c88647 r9:858c0000 r8:8505d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8505d880 r8:8027f5e8 r7:ec6d9e60 r6:84fa6a80 r5:858c0000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1000:5784 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1000 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6f5d84 r8:00000002 r7:60000113 r6:ec6f5d8c r5:858c2400 r4:858c2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858546c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa338c r4:84fa3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa338c r4:8505d900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8505d900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:1001:5786 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ec701d84 r8:00000002 r7:60000113 r6:ec701d8c r5:858c3000 r4:858c3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858549c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa3b8c r4:84fa3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa3b8c r4:8505d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c3000 r8:8505d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d980 r8:8027f5e8 r7:ec6d9e60 r6:84fa6b80 r5:858c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858548c0 INFO: task kworker/0:1001:5786 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bfbfc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1002:5788 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1002 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb719000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8505da00 r10:00000000 r9:8505da00 r8:8027f5e8 r7:ec701e60 r6:84fa6c00 r5:858c5400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bfbfc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1003:5790 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1003 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec731d84 r8:00000002 r7:60000113 r6:ec731d8c r5:858c6c00 r4:858c6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85854a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb553000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fa3f8c r4:84fa3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fa3f8c r4:8505da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c6c00 r8:8505daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505da80 r8:8027f5e8 r7:ec709e60 r6:84fa6c80 r5:858c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec731fb0 to 0xec731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85854940 INFO: task kworker/0:1003:5790 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: bfed5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1004:5793 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1004 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec74dd84 r8:00000002 r7:60000113 r6:ec74dd8c r5:858c6000 r4:858c6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85854bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbc38c r4:84fbc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbc38c r4:8505db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c6000 r8:8505db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505db00 r8:8027f5e8 r7:ec709e60 r6:84fa6d00 r5:858c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85854ac0 INFO: task kworker/0:1004:5793 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c02d5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) task:kworker/0:1005 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbc78c r4:84fbc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbc78c r4:8505db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c8000 r8:8505dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505db80 r8:8027f5e8 r7:ec709e60 r6:84fa6d80 r5:858c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec759fb0 to 0xec759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85854c00 INFO: task kworker/0:1005:5794 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c02d5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:1006 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507dfc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84fbd78c r4:8505dc00 Exception stack(0xec761fb0 to 0xec761ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:5798 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec769d84 r8:00000002 r7:60000113 r6:ec769d8c r5:858c8c00 r4:858c8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec769e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8476ea00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb759000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbcf8c r4:84fbcc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbcf8c r4:8505dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c8c00 r8:8505dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505dc80 r8:8027f5e8 r7:ec761e60 r6:84fa6e80 r5:858c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec769fb0 to 0xec769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476ea40 INFO: task kworker/0:1007:5798 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c067e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec771d84 r8:00000002 r7:60000113 r6:ec771d8c r5:858ca400 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84fbd38c r4:8505dd00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1009:5801 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1009 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec775d84 r8:00000002 r7:60000113 r6:ec775d8c r5:858cbc00 r4:858cbc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858cbc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbdf8c r4:84fbdc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbdf8c r4:8505dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858cbc00 r8:8505ddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505dd80 r8:8027f5e8 r7:ec761e60 r6:84fa6f80 r5:858cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8584f500 INFO: task kworker/0:1009:5801 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c0ab3000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec6b1d84 r8:00000002 r7:60000113 r6:ec6b1d8c r5:858cc800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84fbdb8c r4:8505de00 r4:8505de00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c0e8c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1011:5807 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1011 state:D stack:0 pid:5807 tgid:5807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec779d84 r8:00000002 r7:60000013 r6:ec779d8c r5:858cd400 r4:858cd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858cd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84fbe38c r4:8505de80 r10:00000000 r9:8505de80 r8:8027f5e8 r7:ec775e60 r6:850a2080 r5:858cd400 INFO: task kworker/0:1011:5807 is blocked on a mutex likely owned by task kworker/0:188:3724. 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) task:kworker/0:1012 state:D stack:0 pid:5810 tgid:5810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec77dd84 r8:00000002 r7:60000113 r6:ec77dd8c r5:858ce000 r4:858ce000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ce000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbe78c r4:84fbe400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbe78c r4:8505df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ce000 r8:8505df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505df00 r8:8027f5e8 r7:ec779e60 r6:850a2100 r5:858ce000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:1013 state:D stack:0 pid:5811 tgid:5811 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec781e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84fbef8c r4:84fbec00 r4:8505df80 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858cb000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcaf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbeb8c r4:84fbe800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbeb8c r4:8508e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858cb000 r8:8508e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508e000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508e000 r8:8027f5e8 r7:ec781e60 r6:850a2200 r5:858cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec785fb0 to 0xec785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85096440 INFO: task kworker/0:1014:5813 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c152c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 r5:00001000 r4:ebccb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84fbf38c r4:8508e080 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:5819 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:5819 tgid:5819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec79dd84 r8:00000002 r7:60000013 r6:ec79dd8c r5:858d2400 r4:858d2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec79de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbfb8c r4:84fbf800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbfb8c r4:8508e100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d2400 r8:8508e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508e100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508e100 r8:8027f5e8 r7:ec791e60 r6:850a2300 r5:858d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec79dfb0 to 0xec79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85096800 INFO: task kworker/0:1016:5819 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 5d20: c17e1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbf78c r4:84fbf400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbf78c r4:8508e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d3000 r8:8508e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508e180 r8:8027f5e8 r7:ec79de60 r6:850a2380 r5:858d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a1fb0 to 0xec7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85096800 INFO: task kworker/0:1017:5820 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c17e1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec53d000 r5:85080f8c r4:85080c00 r10:61c88647 r9:858d0c00 r8:8508e22c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:e04e5dc0 r5:00001000 r4:dfecf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:858d4800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec509000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fbff8c r4:84fbfc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fbff8c r4:8508e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d4800 r8:8508e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508e280 r8:8027f5e8 r7:ec7a9e60 r6:850a2480 r5:858d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85096a00 INFO: task kworker/0:1019:5823 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c1ae2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1020:5825 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1020 state:D stack:0 pid:5825 tgid:5825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7b5d84 r8:00000002 r7:60000013 r6:ec7b5d8c r5:858d3c00 r4:858d3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec513000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508038c r4:85080000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508038c r4:8508e380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d3c00 r8:8508e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508e380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508e380 r8:8027f5e8 r7:ec7a9e60 r6:850a2500 r5:858d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b5fb0 to 0xec7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85096e40 INFO: task kworker/0:1020:5825 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:858d5400 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec51f000 r5:8508078c r4:85080400 r10:61c88647 r9:858d5400 r8:8508e32c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:1021:5827 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c235c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1022:5829 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1022 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:858d1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r5:00001000 r4:ec531000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:858d1800 r8:8508e42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8581c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:00001000 r4:ec55f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec5a1fb0 to 0xec5a1ff8) r4:850aa380 INFO: task kworker/0:1023:5831 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c2775000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:5838 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:5838 tgid:5838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:858d6000 r4:858d6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec80f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:858d6000 r8:850a26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec7cdd84 r8:00000002 r7:60000113 r6:ec7cdd8c r5:84f81800 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7740 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f81800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb731000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577fb8c r4:8577f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577fb8c r4:850a2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f81800 r8:850a282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2800 r8:8027f5e8 r7:ebc09e60 r6:850a2880 r5:84f81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7cdfb0 to 0xec7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b7f40 INFO: task kworker/1:323:5888 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c2a78000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84faa640 Workqueue: events bpf_prog_free_deferred r5:84f80000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb55d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:325:5899 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec81dd84 r8:00000002 r7:60000013 r6:ec81dd8c r5:84f82400 r4:84f82400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f82400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900f40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f82400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4b78c r4:84d4b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4b78c r4:850a2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f82400 r8:850a2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2a00 r8:8027f5e8 r7:ec7cde60 r6:850a2a80 r5:84f82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b7900 INFO: task kworker/1:325:5899 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c2fe3000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebbab000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:850a2b00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec83dd84 r8:00000002 r7:60000113 r6:ec83dd8c r5:8581ec00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebcb1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4b38c r4:850a2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581ec00 r8:850a2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2c00 r8:8027f5e8 r7:ec81de60 r6:8508e700 r5:8581ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476ee40 INFO: task kworker/1:327:5906 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c3320000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec845d84 r8:00000002 r7:60000113 r6:ec845d8c r5:8581b000 r4:00000000 r9:83018205 r8:8581b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 r5:00001000 r4:ec5ed000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec845fb0 to 0xec845ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f90c0 INFO: task kworker/1:328:5908 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c3320000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:5909 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8581d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r5:00001000 r4:ebcf7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584478c r4:85844400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8584478c r4:850a2d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581d400 r8:850a2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2d00 r8:8027f5e8 r7:ec845e60 r6:8508e800 r5:8581d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f90c0 INFO: task kworker/1:329:5909 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba31000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85941f8c r4:85941c00 r10:61c88647 r9:8581a400 r8:850a2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:5937 tgid:5937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:84f86000 r4:84f86000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f86000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f9dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f86000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85942f8c r4:85942c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85942f8c r4:850a2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f86000 r8:850a2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2e00 r8:8027f5e8 r7:ec845e60 r6:850a2e80 r5:84f86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f9cc0 INFO: task kworker/1:331:5937 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c3aad000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:332:5944 blocked for more than 474 seconds. r4:84f86c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec84de08 r5:00001000 r4:ec7a3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f86c00 r8:850a2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2f00 r8:8027f5e8 r7:ec845e60 r6:850a2f80 r5:84f86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f9f00 INFO: task kworker/1:332:5944 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c3aad000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:5947 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec831d84 r8:00000002 r7:60000113 r6:ec831d8c r5:84f83c00 r4:84f83c00 r5:84f83c00 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb0e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84d4bb8c r4:84d4b800 r10:61c88647 r9:84f83c00 r8:8591002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:5957 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:84f84800 r4:84f84800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f84800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85906ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f84800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4af8c r4:84d4ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4af8c r4:85910100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f84800 r8:8591012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910100 r8:8027f5e8 r7:ec84de60 r6:85910180 r5:84f84800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f9440 INFO: task kworker/1:334:5957 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c40b4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8595ff8c r4:8595fc00 r4:85910200 Exception stack(0xec80dfb0 to 0xec80dff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:6047 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:6047 tgid:6047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec841d84 r8:00000002 r7:60000113 r6:ec841d8c r5:858c3c00 r4:858c3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a9280 r9:83018205 r8:858c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f185000 r5:00001000 r4:ec763000 r5:858a838c r4:858a8000 r4:85910300 Exception stack(0xec841fb0 to 0xec841ff8) r4:851a93c0 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c4398000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec9c1d84 r8:00000002 r7:60000113 r6:ec9c1d8c r5:85831800 r4:00000000 r9:83018205 r8:85831800 r7:00000000 r6:83018200 r5:00001000 r4:7f24f000 r5:00001000 r4:ebcc9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858aa38c r4:85910400 Exception stack(0xec9c1fb0 to 0xec9c1ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:338:6081 blocked for more than 474 seconds. r4:85830000 r5:85830000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c6ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85830000 r7:00000000 r6:83018200 r5:00001000 r4:7f24d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a9f8c r4:858a9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a9f8c r4:85910500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830000 r8:8591052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910500 r8:8027f5e8 r7:ec9c1e60 r6:85910580 r5:85830000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca01fb0 to 0xeca01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a9cc0 INFO: task kworker/1:338:6081 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c4a6b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85836c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r5:00001000 r4:ec53b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858aa78c r4:858aa400 r10:61c88647 r9:85836c00 r8:8591062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910600 r8:8027f5e8 r7:ec9c1e60 r6:85910680 r5:85836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ceec0 INFO: task kworker/1:339:6156 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:340 state:D stack:0 pid:6159 tgid:6159 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ad000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:6160 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:6160 tgid:6160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb95d84 r8:00000002 r7:60000013 r6:ecb95d8c r5:85834800 r4:85834800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85834800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f255000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec643000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858aaf8c r4:858aac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858aaf8c r4:85910800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85834800 r8:8591082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910800 r8:8027f5e8 r7:ecb1de60 r6:85910880 r5:85834800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb95fb0 to 0xecb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:342 state:D stack:0 pid:6162 tgid:6162 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r5:00001000 r4:ec6c9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85910900 r8:8027f5e8 r7:ecb95e60 r6:85910980 r5:85835400 r4:852d0080 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:6164 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbe5d84 r8:00000002 r7:60000013 r6:ecbe5d8c r5:85832400 r4:85832400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85832400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d01c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85832400 r7:00000000 r6:83018200 r5:00001000 r4:7f259000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec70d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ab78c r4:858ab400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ab78c r4:85910a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85832400 r8:85910a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910a00 r8:8027f5e8 r7:ecbbde60 r6:85910a80 r5:85832400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85833c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f261000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec821000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4e38c r4:84d4e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4e38c r4:85910b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833c00 r8:85910b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910b00 r8:8027f5e8 r7:ecbe5e60 r6:85910b80 r5:85833c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0280 INFO: task kworker/1:344:6165 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c582f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r5:00001000 r4:ec765000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858abb8c r4:85910c00 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:6171 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:6171 tgid:6171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbfdd84 r8:00000002 r7:60000013 r6:ecbfdd8c r5:84f85400 r4:84f85400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f85400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f85400 r7:00000000 r6:83018200 r5:00001000 r4:7f25f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858abf8c r4:858abc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858abf8c r4:85910d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f85400 r8:85910d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910d00 r8:8027f5e8 r7:ecbf5e60 r6:85910d80 r5:84f85400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d06c0 INFO: task kworker/1:346:6171 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c58a5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85830c00 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec8ff000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:6175 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbf1d84 r8:00000002 r7:60000113 r6:ecbf1d8c r5:85833000 r4:85833000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85833000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85833000 r7:00000000 r6:83018200 r5:00001000 r4:7f265000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec915000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4db8c r4:84d4d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4db8c r4:85910f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833000 r8:85910f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85910f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85910f00 r8:8027f5e8 r7:ecbf9e60 r6:85910f80 r5:85833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0580 INFO: task kworker/1:348:6175 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:82ac11e4 r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec929000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d4d78c r4:852e1000 Exception stack(0xecc01fb0 to 0xecc01ff8) Workqueue: events bpf_prog_free_deferred 5d20: c5f94000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc05d84 r8:00000002 r7:60000113 r6:ecc05d8c r5:85108c00 r4:85108c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85108c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0e00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85108c00 r7:00000000 r6:83018200 r5:00001000 r4:7f269000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec945000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4d38c r4:84d4d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4d38c r4:852e1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85108c00 r8:852e112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1100 r8:8027f5e8 r7:ecc01e60 r6:852e1180 r5:85108c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0c80 INFO: task kworker/1:350:6180 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c6380000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85109800 r7:00000000 r6:83018200 r5:00001000 r4:7f26b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r5:800f0013 r4:80239bb0 r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8510a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r5:00001000 r4:ec969000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:858b838c r4:852e1300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510a400 r8:852e132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1300 r8:8027f5e8 r7:ecc0de60 r6:852e1380 r5:8510a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85374100 INFO: task kworker/1:352:6183 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c6999000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:6185 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:6185 tgid:6185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc09d84 r8:00000002 r7:60000113 r6:ecc09d8c r5:8510b000 r4:8510b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8510b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85374300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510b000 r7:00000000 r6:83018200 r5:00001000 r4:7f271000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b8b8c r4:858b8800 r7:ddde2d80 r6:83018200 r5:858b8b8c r4:852e1400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85374100 INFO: task kworker/1:353:6185 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c6999000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec9a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8510bc00 r8:852e152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: c6d60000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:355:6190 blocked for more than 474 seconds. task:kworker/1:355 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc1dd84 r8:00000002 r7:60000013 r6:ecc1dd8c r5:8510c800 r4:8510c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8510c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85374500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510c800 r7:00000000 r6:83018200 r5:00001000 r4:7f273000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b8f8c r4:858b8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b8f8c r4:852e1600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510c800 r8:852e162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1600 r8:8027f5e8 r7:ecc09e60 r6:852e1680 r5:8510c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc1dfb0 to 0xecc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85374340 INFO: task kworker/1:355:6190 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c6e6d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) r4:84faa640 task:kworker/1:356 state:D stack:0 pid:6191 tgid:6191 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eca13000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:852e1700 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c6e6d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:6194 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:6194 tgid:6194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc21d84 r8:00000002 r7:60000013 r6:ecc21d8c r5:8510e000 r4:8510e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec9fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858b938c r4:858b9000 r4:852e1800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:6196 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:6196 tgid:6196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:85818c00 r4:85818c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85818c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc2de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85374900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85818c00 r7:00000000 r6:83018200 r5:00001000 r4:7f279000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9b8c r4:858b9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b9b8c r4:852e1900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818c00 r8:852e192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1900 r8:8027f5e8 r7:ecc19e60 r6:8508e900 r5:85818c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc2dfb0 to 0xecc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:6199 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:6199 tgid:6199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc35d84 r8:00000002 r7:60000013 r6:ecc35d8c r5:8581bc00 r4:8581bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc35e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85374b40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f27b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca31000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9f8c r4:858b9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b9f8c r4:852e1a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581bc00 r8:852e1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1a00 r8:8027f5e8 r7:ecc31e60 r6:8508ea00 r5:8581bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc35fb0 to 0xecc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85374b00 INFO: task kworker/1:360:6199 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c7840000 dfe5f000 00000001 80239b98 7f1e3000 00000001 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ba78c r4:852e1a80 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c7840000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:6203 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:6203 tgid:6203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc3dd84 r8:00000002 r7:60000113 r6:ecc3dd8c r5:84760000 r4:84760000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84760000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc3de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c3040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84760000 r7:00000000 r6:83018200 r5:00001000 r4:7f281000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca53000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bab8c r4:858ba800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bab8c r4:852e1b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84760000 r8:852e1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Not tainted 6.15.0-syzkaller #0 Call trace: r4:84760c00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfb5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858baf8c r4:852e1b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84760c00 r8:852e1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1b80 r8:8027f5e8 r7:ecc3de60 r6:8508eb80 r5:84760c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c3100 INFO: task kworker/1:363:6205 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c8038000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:6207 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc49d84 r8:00000002 r7:60000013 r6:ecc49d8c r5:84762400 r5:84762400 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca67000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:6209 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:6209 tgid:6209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc51d84 r8:00000002 r7:60000013 r6:ecc51d8c r5:84761800 r4:84761800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84761800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c3480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84761800 r7:00000000 r6:83018200 r5:00001000 r4:7f285000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb78c r4:858bb400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bb78c r4:852e1c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84761800 r8:852e1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1c80 r8:8027f5e8 r7:ecc49e60 r6:8508ec80 r5:84761800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc51fb0 to 0xecc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: c8443000 dfe5f000 00000001 80239b98 7f1e3000 00000001 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fab400 Exception stack(0xe04e5fb0 to 0xe04e5ff8) Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858bbb8c r4:858bb800 r10:61c88647 r9:84763c00 r8:852e1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04e5fb0 to 0xe04e5ff8) Not tainted 6.15.0-syzkaller #0 r4:84765400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc5de08 r5:00001000 r4:ecb25000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858bd78c r4:852e1d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c884c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:6214 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:6214 tgid:6214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc61d84 r8:00000002 r7:60000013 r6:ecc61d8c r5:84766000 r4:84766000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84766000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc61e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c36c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84766000 r7:00000000 r6:83018200 r5:00001000 r4:7f289000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bbf8c r4:858bbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bbf8c r4:852e1e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84766000 r8:852e1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1e00 r8:8027f5e8 r7:ecc5de60 r6:8508ee00 r5:84766000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc61fb0 to 0xecc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c3540 INFO: task kworker/1:368:6214 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c8bbe000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:6216 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:6216 tgid:6216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc69d84 r8:00000002 r7:60000113 r6:ecc69d8c r5:84764800 r4:84764800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84764800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c3800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84764800 r7:00000000 r6:83018200 r5:00001000 r4:7f28b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bc38c r4:858bc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bc38c r4:852e1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84764800 r8:852e1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e1e80 r8:8027f5e8 r7:ecc5de60 r6:8508ee80 r5:84764800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c3700 INFO: task kworker/1:369:6216 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c8bbe000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:6218 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:6218 tgid:6218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc71d84 r8:00000002 r7:60000113 r6:ecc71d8c r5:84766c00 r4:84766c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84766c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc71e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c3a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecaeb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:371:6220 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:6220 tgid:6220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc79d84 r8:00000002 r7:60000013 r6:ecc79d8c r5:851f0c00 r4:851f0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c3b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f28f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bcb8c r4:858bc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bcb8c r4:852e1f80 r10:61c88647 r9:851f0c00 r8:852e1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c3940 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:6223 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecafd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:851f3000 r8:859d20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c3c00 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:6227 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:6227 tgid:6227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc95d84 r8:00000002 r7:60000113 r6:ecc95d8c r5:851f0000 r4:851f0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f299000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bdf8c r4:858bdc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bdf8c r4:859d2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f0000 r8:859d212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2100 r8:8027f5e8 r7:ecc5de60 r6:859cb100 r5:851f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc95fb0 to 0xecc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c3fc0 INFO: task kworker/1:374:6227 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 INFO: task kworker/1:375:6228 blocked for more than 474 seconds. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb31000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858bdb8c r4:859d2180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c95fd000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:6231 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:851f5400 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecb4f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r4:84faa640 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cd300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f2a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858beb8c r4:858be800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858beb8c r4:859d2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f6000 r8:859d22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2280 r8:8027f5e8 r7:ecca1e60 r6:859cb280 r5:851f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca5fb0 to 0xecca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cd100 INFO: task kworker/1:377:6233 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c9e3d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r5:00001000 r4:ecb61000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858be78c r4:858be400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858be78c r4:859d2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f6c00 r8:859d232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2300 r8:8027f5e8 r7:ecca5e60 r6:859cb300 r5:851f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cd100 INFO: task kworker/1:378:6234 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: c9e3d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:6238 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:6238 tgid:6238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:851f4800 r4:851f4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cd440 r5:00001000 r4:ecb9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858bef8c r4:858bec00 r10:61c88647 r9:851f4800 r8:859d23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859cd340 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:6240 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:6240 tgid:6240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccadd84 r8:00000002 r7:60000013 r6:eccadd8c r5:851f1800 r4:851f1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecbb1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecbc7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84763000 r8:859d24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859cd4c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ca3fd000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:6244 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc91d84 r8:00000002 r7:60000113 r6:ecc91d8c r5:858db000 r4:858db000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858db000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecbd9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ecc25d84 r8:00000002 r7:60000113 r6:ecc25d8c r5:858dbc00 r4:858dbc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dbc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cda40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2ab000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccb5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bff8c r4:858bfc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bff8c r4:859d2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858dbc00 r8:859d262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2600 r8:8027f5e8 r7:ecc91e60 r6:859d2680 r5:858dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cd880 INFO: task kworker/1:383:6246 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ca9d4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858dc800 r4:00000000 r9:83018205 r8:858dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2ad000 r5:00001000 r4:eccc3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:6250 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:6250 tgid:6250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccc1d84 r8:00000002 r7:60000013 r6:eccc1d8c r5:858dd400 r4:858dd400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dd400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cdcc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f2af000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3c78c r4:85a3c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3c78c r4:859d2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858dd400 r8:859d282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2800 r8:8027f5e8 r7:eccb9e60 r6:859d2880 r5:858dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cdb40 INFO: task kworker/1:385:6250 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r5:800f0013 r4:80239bb0 r4:e04e5dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:386:6252 blocked for more than 474 seconds. r4:858de000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecccde08 r5:00001000 r4:eccd7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cdbc0 INFO: task kworker/1:386:6252 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cae52000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:6254 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:6254 tgid:6254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccd5d84 r8:00000002 r7:60000013 r6:eccd5d8c r5:858dec00 r4:858dec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cd380 r5:00001000 r4:eccdd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3cf8c r4:85a3cc00 r7:ddde2d80 r6:83018200 r5:85a3cf8c r4:859d2a00 r4:00000001 Exception stack(0xeccd5fb0 to 0xeccd5ff8) r4:859cdfc0 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r4:858da400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecceb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3d38c r4:85a3d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3d38c r4:859d2b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858da400 r8:859d2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2b00 r8:8027f5e8 r7:eccd5e60 r6:859d2b80 r5:858da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce1fb0 to 0xecce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859bd080 INFO: task kworker/1:388:6256 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cb309000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:6258 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:6258 tgid:6258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecce9d84 r8:00000002 r7:60000113 r6:ecce9d8c r5:858d9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r5:00001000 r4:eccf1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a3d78c r4:859d2c00 Exception stack(0xecce9fb0 to 0xecce9ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:6260 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:6260 tgid:6260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccf5d84 r8:00000002 r7:60000113 r6:eccf5d8c r5:858d8000 r4:858d8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bd380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f2b9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3db8c r4:85a3d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3db8c r4:859d2d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d8000 r8:859d2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2d00 r8:8027f5e8 r7:ecce9e60 r6:859d2d80 r5:858d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf5fb0 to 0xeccf5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:859bd180 Workqueue: events bpf_prog_free_deferred 5d20: cb61b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecd05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3df8c r4:85a3dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3df8c r4:859d2e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d8c00 r8:859d2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d2e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d2e80 r8:8027f5e8 r7:eccf5e60 r6:859d2f00 r5:858d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccfdfb0 to 0xeccfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859bd340 INFO: task kworker/1:391:6262 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cbc8b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:6264 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:6264 tgid:6264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd09d84 r8:00000002 r7:60000013 r6:ecd09d8c r5:8510ec00 r4:8510ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8510ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd09e08 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:ecd13000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3e38c r4:85a3e000 r7:ddde2d80 r6:83018200 r5:85a3e38c r4:859d2e00 r10:61c88647 r9:8510ec00 r8:859d2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 r4:859bd400 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:6266 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:6266 tgid:6266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd11d84 r8:00000002 r7:60000013 r6:ecd11d8c r5:858e0000 r4:858e0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd11e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bd980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3eb8c r4:85a3e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3eb8c r4:859ae000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e0000 r8:859ae02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae000 r8:8027f5e8 r7:ecd09e60 r6:859ae080 r5:858e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd11fb0 to 0xecd11ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: cbfaa000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:00000000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r4:84faa640 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecd19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82918930 r9:ecd25d84 r8:00000002 r7:60000113 r6:ecd25d8c r5:858e1800 r4:858e1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bdb00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd2d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3ef8c r4:85a3ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3ef8c r4:859ae200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e1800 r8:859ae22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae200 r8:8027f5e8 r7:ecd11e60 r6:859ae280 r5:858e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859bd8c0 INFO: task kworker/1:395:6270 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cc336000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:6272 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:6272 tgid:6272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd31d84 r8:00000002 r7:60000013 r6:ecd31d8c r5:858e2400 r4:858e2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd31e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bdcc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3f38c r4:85a3f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3f38c r4:859ae300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e2400 r8:859ae32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae300 r8:8027f5e8 r7:ecd25e60 r6:859ae380 r5:858e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859bda40 INFO: task kworker/1:396:6272 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:397:6274 blocked for more than 475 seconds. Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r5:00001000 r4:ecd4f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a3fb8c r4:859ae400 Exception stack(0xecd39fb0 to 0xecd39ff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:6275 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:6275 tgid:6275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd4dd84 r8:00000002 r7:60000013 r6:ecd4dd8c r5:858e3c00 r4:858e3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd4de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bde40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3f78c r4:85a3f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3f78c r4:859ae500 r10:00000000 r9:859ae500 r8:8027f5e8 r7:ecd39e60 r6:859ae580 r5:858e3c00 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:00000000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f140 r5:00001000 r4:ecd55000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: cca38000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:6280 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:6280 tgid:6280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd65d84 r8:00000002 r7:60000113 r6:ecd65d8c r5:853db000 r4:853db000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853db000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853db000 r7:00000000 r6:83018200 r5:00001000 r4:7f2cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd67000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4c38c r4:85a4c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4c38c r4:859ae700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853db000 r8:859ae72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae700 r8:8027f5e8 r7:ecd45e60 r6:859cb500 r5:853db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd65fb0 to 0xecd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523f100 INFO: task kworker/1:400:6280 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853da400 r7:00000000 r6:83018200 r5:00001000 r4:7f2cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd6d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4c78c r4:85a4c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4c78c r4:859ae780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853da400 r8:859ae7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae780 r8:8027f5e8 r7:ecd65e60 r6:859cb580 r5:853da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523f2c0 INFO: task kworker/1:401:6283 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ccda0000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:402 state:D stack:0 pid:6284 tgid:6284 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f600 r5:00001000 r4:ecd87000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: ccf9a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:6285 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:6285 tgid:6285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd85d84 r8:00000002 r7:60000113 r6:ecd85d8c r5:853dc800 r4:853dc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853dc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e06c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2fb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca49000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4f78c r4:85a4f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4f78c r4:859ae880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dc800 r8:859ae8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae880 r8:8027f5e8 r7:ecd81e60 r6:859cb680 r5:853dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd85fb0 to 0xecd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: cd2cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r4:00000000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523fb00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f259000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c238c r4:854c2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c238c r4:859ae900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dd400 r8:859ae92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859ae900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ae900 r8:8027f5e8 r7:ecd85e60 r6:859cb700 r5:853dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd99fb0 to 0xecd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523f940 INFO: task kworker/1:404:6295 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cd2cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec99f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a4df8c r4:859ae980 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:6377 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:6377 tgid:6377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eceb5d84 r8:00000002 r7:60000013 r6:eceb5d8c r5:853dec00 r4:853dec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853dec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f2ef000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4e38c r4:85a4e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4e38c r4:859aea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dec00 r8:859aea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859aea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859aea00 r8:8027f5e8 r7:ecd85e60 r6:859cb800 r5:853dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523f9c0 INFO: task kworker/1:406:6377 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d20: cd7a8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecebdd84 r8:00000002 r7:60000013 r6:ecebdd8c r5:853d8000 r4:853d8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecebde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0140 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f2f1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4e78c r4:85a4e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4e78c r4:859aea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d8000 r8:859aeaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859aea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859aea80 r8:8027f5e8 r7:ecd85e60 r6:859cb880 r5:853d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecebdfb0 to 0xecebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859e0280 INFO: task kworker/1:407:6379 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cdb6c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e04e5dc0 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:408:6383 blocked for more than 475 seconds. r10:82918930 r9:ecec1d84 r8:00000002 r7:60000113 r6:ecec1d8c r5:853dbc00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec569000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:6385 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:6385 tgid:6385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecec5d84 r8:00000002 r7:60000013 r6:ecec5d8c r5:85400000 r4:85400000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85400000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0440 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f2f7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec745000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4ef8c r4:85a4ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4ef8c r4:859aeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400000 r8:859aebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859aeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859aeb80 r8:8027f5e8 r7:ecd85e60 r6:859cb980 r5:85400000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec5fb0 to 0xecec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859e03c0 INFO: task kworker/1:409:6385 is blocked on a mutex likely owned by task kworker/0:188:3724. Workqueue: events bpf_prog_free_deferred 5d20: ce0eb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84faa640 r5:85400c00 r4:8291892c r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85400c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2f9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4f38c r4:85a4f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4f38c r4:859aec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400c00 r8:859aec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859aec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859aec00 r8:8027f5e8 r7:ecd85e60 r6:859cba00 r5:85400c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec9fb0 to 0xecec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d20: ce544000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f2ff000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca79000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4ff8c r4:85a4fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4ff8c r4:859aec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85402400 r8:859aecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859aec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859aec80 r8:8027f5e8 r7:ecd85e60 r6:859cba80 r5:85402400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859e0740 INFO: task kworker/1:411:6389 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ce544000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:6390 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:6390 tgid:6390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eced5d84 r8:00000002 r7:60000113 r6:eced5d8c r5:85403000 r4:85403000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85403000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca61000 r7:ddde2d80 r6:83018200 r5:85a4fb8c r4:859aed00 r4:859e0740 5d20: ce544000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:413 state:D stack:0 pid:6393 tgid:6393 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0c80 r5:00001000 r4:ecb11000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8470538c r4:859aed80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:6396 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:6396 tgid:6396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eced9d84 r8:00000002 r7:60000013 r6:eced9d8c r5:858e6000 r4:858e6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e0b80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8470578c r4:859aee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e6000 r8:859aeeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859aee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859aee80 r8:8027f5e8 r7:eceb9e60 r6:859aef00 r5:858e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859e0dc0 INFO: task kworker/1:414:6396 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:415 state:D stack:0 pid:6398 tgid:6398 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecb59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d4ef8c r4:859aef80 r10:00000000 r9:859aef80 r8:8027f5e8 r7:eceb9e60 r6:859d4000 r5:858e6c00 Exception stack(0xecee1fb0 to 0xecee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859e0980 INFO: task kworker/1:415:6398 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cf242000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:6400 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecee5d84 r8:00000002 r7:60000013 r6:ecee5d8c r5:851b0c00 r4:851b0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee5e08 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecb3b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84d4f38c r4:84d4f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4f38c r4:859d4080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b0c00 r8:859d40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4080 r8:8027f5e8 r7:ecee1e60 r6:859d4100 r5:851b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee5fb0 to 0xecee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859e0f00 INFO: task kworker/1:416:6400 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cf883000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:417:6402 blocked for more than 475 seconds. r10:82918930 r9:ecee9d84 r8:00000002 r7:60000113 r6:ecee9d8c r5:851b0000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecba9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84d4eb8c r4:84d4e800 r10:61c88647 r9:851b0000 r8:859d41ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:418 state:D stack:0 pid:6405 tgid:6405 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecc45000 r5:85a5038c r4:85a50000 r7:ddde2d80 r6:83018200 r5:85a5038c r4:859d4280 r10:00000000 r9:859d4280 r8:8027f5e8 r7:ecee9e60 r6:859d4300 r5:851b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceedfb0 to 0xeceedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d7340 INFO: task kworker/1:418:6405 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: cfbcc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 task:kworker/1:419 state:D stack:0 pid:6406 tgid:6406 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecbd1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d00cb000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:6409 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:6409 tgid:6409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecef5d84 r8:00000002 r7:60000013 r6:ecef5d8c r5:851b4800 r4:851b4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d7b80 r5:00001000 r4:ecc8b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:851b4800 r8:859d44ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d7740 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:6411 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:6411 tgid:6411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecefdd84 r8:00000002 r7:60000113 r6:ecefdd8c r5:851b5400 r4:851b5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecefde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d7980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5078c r4:85a50400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5078c r4:859d4580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b5400 r8:859d45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4580 r8:8027f5e8 r7:ecef5e60 r6:859d4600 r5:851b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecefdfb0 to 0xecefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d7940 INFO: task kworker/1:421:6411 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 5d20: d07c2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:422 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eccf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:851b6000 r8:859d46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d7b40 INFO: task kworker/1:422:6413 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d07c2000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:423:6415 blocked for more than 475 seconds. Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d7d80 r5:00001000 r4:eccb3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851b6c00 r8:859d47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d7d40 INFO: task kworker/1:423:6415 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d0d37000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:424:6417 blocked for more than 475 seconds. r10:82918930 r9:ecf09d84 r8:00000002 r7:60000013 r6:ecf09d8c r5:853d9800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecccf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a5138c r4:859d4880 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r4:84fab400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:425:6418 blocked for more than 475 seconds. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5178c r4:85a51400 r10:61c88647 r9:851b3c00 r8:859d49ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d1174000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:6421 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:6421 tgid:6421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf11d84 r8:00000002 r7:60000013 r6:ecf11d8c r5:858e9800 r4:858e9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf11e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d84c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f31f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a51f8c r4:85a51c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a51f8c r4:859d4a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e9800 r8:859d4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4a80 r8:8027f5e8 r7:ecf01e60 r6:859d4b00 r5:858e9800 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 task:kworker/1:427 state:D stack:0 pid:6423 tgid:6423 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d85c0 r5:00001000 r4:ecd29000 r7:ddde2d80 r6:83018200 r5:85a5238c r4:859d4b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ea400 r8:859d4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4b80 r8:8027f5e8 r7:ecf11e60 r6:859d4c00 r5:858ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d8480 INFO: task kworker/1:427:6423 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d17e8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6425 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6425 tgid:6425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf15d84 r8:00000002 r7:60000113 r6:ecf15d8c r5:858eb000 r4:858eb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858eb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f327000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd53000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a52b8c r4:85a52800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a52b8c r4:859d4c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858eb000 r8:859d4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4c80 r8:8027f5e8 r7:ecedde60 r6:859d4d00 r5:858eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf15fb0 to 0xecf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d8540 INFO: task kworker/1:428:6425 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d17e8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d8940 r5:00001000 r4:ecd47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:858e8000 r8:859d4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d8900 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf0dd84 r8:00000002 r7:60000113 r6:ecf0dd8c r5:858ec800 r4:858ec800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ec800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf0de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d8bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f329000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd73000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a52f8c r4:85a52c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a52f8c r4:859d4e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ec800 r8:859d4eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4e80 r8:8027f5e8 r7:ecf15e60 r6:859d4f00 r5:858ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf0dfb0 to 0xecf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d8a40 INFO: task kworker/1:430:6431 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d1d29000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e04e5dc0 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:6432 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:6432 tgid:6432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ece89d84 r8:00000002 r7:60000013 r6:ece89d8c r5:858ed400 r4:858ed400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ed400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d8dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f32b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd8b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5338c r4:85a53000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5338c r4:859d4f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ed400 r8:859d4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d4f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d4f80 r8:8027f5e8 r7:ecf0de60 r6:859d5000 r5:858ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece89fb0 to 0xece89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d8b40 INFO: task kworker/1:431:6432 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5c38c r4:85a5c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:ecde9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:858e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f335000 r5:00001000 r4:ece05000 r5:85a53b8c r4:85a53800 r10:61c88647 r9:858e8c00 r8:859d52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5280 r8:8027f5e8 r7:ecf21e60 r6:859d5300 r5:858e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf35fb0 to 0xecf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d9140 INFO: task kworker/1:434:6441 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d2ac9000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ece11000 r5:85a53f8c r4:85a53c00 Exception stack(0xecf39fb0 to 0xecf39ff8) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:6445 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf3dd84 r8:00000002 r7:60000013 r6:ecf3dd8c r5:858f1800 r4:858f1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf3de08 r9:83018205 r8:858f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5c78c r4:85a5c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5c78c r4:859d5480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f1800 r8:859d54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5480 r8:8027f5e8 r7:ecf21e60 r6:859d5500 r5:858f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf3dfb0 to 0xecf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d9400 INFO: task kworker/1:436:6445 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:6447 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:6447 tgid:6447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf2dd84 r8:00000002 r7:60000013 r6:ecf2dd8c r5:858f2400 r4:858f2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf2de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d9980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f33d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5cb8c r4:85a5c800 r10:61c88647 r9:858f2400 r8:859d55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:82ac11e4 r4:00000000 r5:84ea6f8c r4:84ea6c00 r4:84fab400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf1de08 r5:00001000 r4:ece49000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a5cf8c r4:859d5680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f3000 r8:859d56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5680 r8:8027f5e8 r7:ecf2de60 r6:859d5700 r5:858f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf1dfb0 to 0xecf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d99c0 INFO: task kworker/1:438:6449 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d397f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 task:kworker/1:439 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf41e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a5d38c r4:859d5780 Exception stack(0xecf41fb0 to 0xecf41ff8) INFO: task kworker/1:439:6451 is blocked on a mutex likely owned by task kworker/0:188:3724. 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecf5d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:440:6455 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d3c73000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:6456 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:6456 tgid:6456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf25d84 r8:00000002 r7:60000013 r6:ecf25d8c r5:858f6000 r4:858f6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:858f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f345000 r5:00001000 r4:ecf4d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5d78c r4:85a5d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5d78c r4:859d5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f6000 r8:859d59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5980 r8:8027f5e8 r7:ecf45e60 r6:859d5a00 r5:858f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859dd0c0 INFO: task kworker/1:441:6456 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d445d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ecf55d84 r8:00000002 r7:60000013 r6:ecf55d8c r5:858f6c00 r4:00000000 r4:00000000 r5:00001000 r4:ecf57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5db8c r4:85a5d800 r7:ddde2d80 r6:83018200 r5:85a5db8c r4:859d5a80 r10:61c88647 r9:858f6c00 r8:859d5aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecf55fb0 to 0xecf55ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) r5:800f0013 r4:80239bb0 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:6460 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:6460 tgid:6460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf69d84 r8:00000002 r7:60000113 r6:ecf69d8c r5:858f5400 r4:858f5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dd540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f34d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf71000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5e78c r4:85a5e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5e78c r4:859d5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f5400 r8:859d5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5b80 r8:8027f5e8 r7:ecf45e60 r6:859d5c00 r5:858f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf69fb0 to 0xecf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859dd480 INFO: task kworker/1:443:6460 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d462f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:6462 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:6462 tgid:6462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf61d84 r8:00000002 r7:60000013 r6:ecf61d8c r5:858f0000 r4:858f0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf61e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dd340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f34b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5e38c r4:85a5e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5e38c r4:859d5c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f0000 r8:859d5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5c80 r8:8027f5e8 r7:ecf69e60 r6:859d5d00 r5:858f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf61fb0 to 0xecf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859dd300 INFO: task kworker/1:444:6462 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d462f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:6465 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:6465 tgid:6465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf75d84 r8:00000002 r7:60000013 r6:ecf75d8c r5:851b1800 r4:851b1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf75e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dd600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5eb8c r4:85a5e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5eb8c r4:859d5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b1800 r8:859d5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5d80 r8:8027f5e8 r7:ecf69e60 r6:859d5e00 r5:851b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf75fb0 to 0xecf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:6466 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:6466 tgid:6466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf7dd84 r8:00000002 r7:60000113 r6:ecf7dd8c r5:858ebc00 r4:858ebc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ebc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf7de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dda40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f353000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5f38c r4:85a5f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5f38c r4:859d5e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d4fbe000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:6469 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:6469 tgid:6469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf89d84 r8:00000002 r7:60000113 r6:ecf89d8c r5:85a88000 r4:85a88000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a88000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dde00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f357000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5fb8c r4:85a5f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5fb8c r4:859d5f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a88000 r8:859d5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859d5f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859d5f80 r8:8027f5e8 r7:ecf7de60 r6:852ca000 r5:85a88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859dda00 INFO: task kworker/1:447:6469 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d4fbe000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6470 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:6470 tgid:6470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfa1d84 r8:00000002 r7:60000013 r6:ecfa1d8c r5:85a88c00 r4:85a88c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a88c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfa1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ddb00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f355000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5f78c r4:85a5f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5f78c r4:852ca080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a88c00 r8:852ca0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca080 r8:8027f5e8 r7:ecf89e60 r6:852ca100 r5:85a88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfa1fb0 to 0xecfa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ddcc0 INFO: task kworker/1:448:6470 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d535b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:6473 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:6473 tgid:6473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf99d84 r8:00000002 r7:60000113 r6:ecf99d8c r5:85a89800 r4:85a89800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a89800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf99e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ddf80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a89800 r7:00000000 r6:83018200 r5:00001000 r4:7f359000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5ff8c r4:85a5fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5ff8c r4:852ca180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a89800 r8:852ca1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca180 r8:8027f5e8 r7:ecf89e60 r6:852ca200 r5:85a89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf99fb0 to 0xecf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859dddc0 INFO: task kworker/1:449:6473 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d535b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:6475 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:6475 tgid:6475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfb1d84 r8:00000002 r7:60000113 r6:ecfb1d8c r5:85a8a400 r4:85a8a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a8a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dd880 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec571000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85a6c38c r4:852ca280 r10:61c88647 r9:85a8a400 r8:852ca2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecfb1fb0 to 0xecfb1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d535b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:6477 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:6477 tgid:6477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecea9d84 r8:00000002 r7:60000013 r6:ecea9d8c r5:85a8b000 r4:85a8b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a8b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d142c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f2cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec823000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6c78c r4:85a6c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6c78c r4:852ca380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8b000 r8:852ca3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca380 r8:8027f5e8 r7:ecfb1e60 r6:852ca400 r5:85a8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859dd800 INFO: task kworker/1:451:6477 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d5761000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:6479 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:6479 tgid:6479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfb9d84 r8:00000002 r7:60000013 r6:ecfb9d8c r5:85a8bc00 r4:85a8bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a8bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6cb8c r4:85a6c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6cb8c r4:852ca480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8bc00 r8:852ca4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca480 r8:8027f5e8 r7:ecea9e60 r6:852ca500 r5:85a8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb9fb0 to 0xecfb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14300 INFO: task kworker/1:452:6479 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d5da4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:6481 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfbdd84 r8:00000002 r7:60000013 r6:ecfbdd8c r5:85a8c800 r4:85a8c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a8c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfbde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f2e9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6cf8c r4:85a6cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6cf8c r4:852ca580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8c800 r8:852ca5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca580 r8:8027f5e8 r7:ecfb9e60 r6:852ca600 r5:85a8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfbdfb0 to 0xecfbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387000 INFO: task kworker/1:453:6481 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d5da4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:6483 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:6483 tgid:6483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfc9d84 r8:00000002 r7:60000013 r6:ecfc9d8c r5:85406c00 r4:85406c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2ed000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecead000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6d78c r4:85a6d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6d78c r4:852ca680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406c00 r8:852ca6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca680 r8:8027f5e8 r7:ecfbde60 r6:859cbb80 r5:85406c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc9fb0 to 0xecfc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387140 INFO: task kworker/1:454:6483 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d6141000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:6485 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfd5d84 r8:00000002 r7:60000113 r6:ecfd5d8c r5:85401800 r4:85401800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85401800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85401800 r7:00000000 r6:83018200 r5:00001000 r4:7f2eb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6d38c r4:85a6d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6d38c r4:852ca700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85401800 r8:852ca72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca700 r8:8027f5e8 r7:ecfc9e60 r6:859cbc00 r5:85401800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd5fb0 to 0xecfd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387240 INFO: task kworker/1:455:6485 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d66ab000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:6486 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:6486 tgid:6486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfd9d84 r8:00000002 r7:60000013 r6:ecfd9d8c r5:85406000 r4:85406000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed001000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6e78c r4:85a6e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6e78c r4:852ca780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406000 r8:852ca7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca780 r8:8027f5e8 r7:ecfc9e60 r6:859cbc80 r5:85406000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd9fb0 to 0xecfd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387240 INFO: task kworker/1:456:6486 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d6a31000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:6488 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:6488 tgid:6488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfe9d84 r8:00000002 r7:60000113 r6:ecfe9d8c r5:85405400 r4:85405400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85405400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853875c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85405400 r7:00000000 r6:83018200 r5:00001000 r4:7f35b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6db8c r4:85a6d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6db8c r4:852ca800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85405400 r8:852ca82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca800 r8:8027f5e8 r7:ecfd9e60 r6:859cbd00 r5:85405400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfe9fb0 to 0xecfe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387700 INFO: task kworker/1:457:6488 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d6f8c000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:6490 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:6490 tgid:6490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecff5d84 r8:00000002 r7:60000113 r6:ecff5d8c r5:85403c00 r4:85403c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85403c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85403c00 r7:00000000 r6:83018200 r5:00001000 r4:7f35d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6df8c r4:85a6dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6df8c r4:852ca900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403c00 r8:852ca92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca900 r8:8027f5e8 r7:ecfd9e60 r6:859cbd80 r5:85403c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff5fb0 to 0xecff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387500 INFO: task kworker/1:458:6490 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d7462000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:6492 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:6492 tgid:6492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed005d84 r8:00000002 r7:60000113 r6:ed005d8c r5:85518c00 r4:85518c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85518c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed005e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f35f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecffb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6e38c r4:85a6e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6e38c r4:852ca880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85518c00 r8:852ca8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca880 r8:8027f5e8 r7:ecfd9e60 r6:859cbe00 r5:85518c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed005fb0 to 0xed005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387940 INFO: task kworker/1:459:6492 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d77b1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:6494 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:6494 tgid:6494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed00dd84 r8:00000002 r7:60000113 r6:ed00dd8c r5:85518000 r4:85518000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85518000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed00de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85518000 r7:00000000 r6:83018200 r5:00001000 r4:7f363000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed017000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6eb8c r4:85a6e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6eb8c r4:852ca980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85518000 r8:852ca9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ca980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ca980 r8:8027f5e8 r7:ecfd9e60 r6:859cbe80 r5:85518000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed00dfb0 to 0xed00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387840 INFO: task kworker/1:460:6494 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d77b1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:6497 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed025d84 r8:00000002 r7:60000113 r6:ed025d8c r5:85519800 r4:85519800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85519800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ce3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85519800 r7:00000000 r6:83018200 r5:00001000 r4:7f36b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed04b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6fb8c r4:85a6f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6fb8c r4:852caa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85519800 r8:852caa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852caa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852caa00 r8:8027f5e8 r7:ed00de60 r6:859cbf00 r5:85519800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed025fb0 to 0xed025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853878c0 INFO: task kworker/1:461:6497 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d7b5d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:6498 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:6498 tgid:6498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed02dd84 r8:00000002 r7:60000013 r6:ed02dd8c r5:8551bc00 r4:8551bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed02de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f365000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6ef8c r4:85a6ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6ef8c r4:852caa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551bc00 r8:852caaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852caa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852caa80 r8:8027f5e8 r7:ed025e60 r6:859cbf80 r5:8551bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed02dfb0 to 0xed02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387d00 INFO: task kworker/1:462:6498 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d7b5d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:6500 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:6500 tgid:6500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed03dd84 r8:00000002 r7:60000013 r6:ed03dd8c r5:8551a400 r4:8551a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed03de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551a400 r7:00000000 r6:83018200 r5:00001000 r4:7f367000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed033000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6f38c r4:85a6f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6f38c r4:852cab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551a400 r8:852cab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cab00 r8:8027f5e8 r7:ed025e60 r6:859b4000 r5:8551a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed03dfb0 to 0xed03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387b40 INFO: task kworker/1:463:6500 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d7b5d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:00000000 r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ecfc1d84 r8:00000002 r7:60000113 r6:ecfc1d8c r5:85a8d400 r4:85a8d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a8d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f369000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed039000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6f78c r4:85a6f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6f78c r4:852cab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8d400 r8:852cabac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cab80 r8:8027f5e8 r7:ed025e60 r6:852cac00 r5:85a8d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc1fb0 to 0xecfc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85387c80 INFO: task kworker/1:464:6502 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d824e000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:6505 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85a8e000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed051000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6ff8c r4:85a6fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a8e000 r8:852cacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed041fb0 to 0xed041ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d84dd000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:6507 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:6507 tgid:6507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfa5d84 r8:00000002 r7:60000013 r6:ecfa5d8c r5:85a8ec00 r4:85a8ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a8ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfa5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f36f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed05f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7038c r4:85a70000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7038c r4:852cad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8ec00 r8:852cadac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cad80 r8:8027f5e8 r7:ed041e60 r6:852cae00 r5:85a8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfa5fb0 to 0xecfa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0000 INFO: task kworker/1:466:6507 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d88b6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 r5:800f0013 r4:80239bb0 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:00001000 r4:dfecf000 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a80000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f373000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed073000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a70b8c r4:85a70800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a70b8c r4:852cae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a80000 r8:852caeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cae80 r8:8027f5e8 r7:ecfa5e60 r6:852caf00 r5:85a80000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed055fb0 to 0xed055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0200 INFO: task kworker/1:467:6509 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d88b6000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:6511 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:6511 tgid:6511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed069d84 r8:00000002 r7:60000013 r6:ed069d8c r5:85a80c00 r4:85a80c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a80c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed069e08 r5:00001000 r4:ed065000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7078c r4:85a70400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7078c r4:852caf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a80c00 r8:852cafac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852caf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852caf80 r8:8027f5e8 r7:ed055e60 r6:859b8000 r5:85a80c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed069fb0 to 0xed069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b03c0 INFO: task kworker/1:468:6511 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d8e58000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 task:kworker/1:469 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f375000 r5:00001000 r4:ed079000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a70f8c r4:85a70c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed07dfb0 to 0xed07dff8) task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:6515 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:6515 tgid:6515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed05dd84 r8:00000002 r7:60000113 r6:ed05dd8c r5:85a82400 r4:85a82400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a82400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed05de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f377000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7138c r4:85a71000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7138c r4:859b8180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a82400 r8:859b81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8180 r8:8027f5e8 r7:ed07de60 r6:859b8200 r5:85a82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b05c0 INFO: task kworker/1:470:6515 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d91ec000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:6518 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:6518 tgid:6518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed085d84 r8:00000002 r7:60000113 r6:ed085d8c r5:85a83000 r4:85a83000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a83000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed085e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f379000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed08d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7178c r4:85a71400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7178c r4:859b8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a83000 r8:859b82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8280 r8:8027f5e8 r7:ed05de60 r6:859b8300 r5:85a83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed085fb0 to 0xed085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0840 INFO: task kworker/1:471:6518 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d92cc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:6520 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed099d84 r8:00000002 r7:60000013 r6:ed099d8c r5:85a83c00 r4:85a83c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a83c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f37b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a71b8c r4:85a71800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a71b8c r4:859b8380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a83c00 r8:859b83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8380 r8:8027f5e8 r7:ed085e60 r6:859b8400 r5:85a83c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed099fb0 to 0xed099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0900 INFO: task kworker/1:472:6520 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9941000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:6521 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed091d84 r8:00000002 r7:60000013 r6:ed091d8c r5:85a84800 r4:85a84800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a84800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed091e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a71f8c r4:85a71c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a71f8c r4:859b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a84800 r8:859b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8480 r8:8027f5e8 r7:ed099e60 r6:859b8500 r5:85a84800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed091fb0 to 0xed091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0a40 INFO: task kworker/1:473:6521 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9941000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:85a85400 r4:8291892c [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:859b8580 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a5fb0 to 0xed0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0c80 INFO: task kworker/1:474:6523 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9a9a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6525 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6525 tgid:6525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0b9d84 r8:00000002 r7:60000013 r6:ed0b9d8c r5:85a86000 r4:85a86000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a86000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f37f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7238c r4:85a72000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7238c r4:859b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a86000 r8:859b86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8680 r8:8027f5e8 r7:ed0a5e60 r6:859b8700 r5:85a86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0b9fb0 to 0xed0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b98c0 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:6527 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:6527 tgid:6527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0add84 r8:00000002 r7:60000113 r6:ed0add8c r5:85a86c00 r4:85a86c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a86c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b9a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7278c r4:85a72400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7278c r4:859b8800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a86c00 r8:859b882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8800 r8:8027f5e8 r7:ed0a5e60 r6:859b8880 r5:85a86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0adfb0 to 0xed0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f040 INFO: task kworker/1:476:6527 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9f52000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:477:6529 blocked for more than 476 seconds. r4:85a98000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9f52000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:6531 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:6531 tgid:6531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0cdd84 r8:00000002 r7:60000013 r6:ed0cdd8c r5:85a98c00 r4:85a98c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a98c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f38b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a73b8c r4:85a73800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a73b8c r4:859b8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a98c00 r8:859b89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8980 r8:8027f5e8 r7:ed0c1e60 r6:859b8a00 r5:85a98c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0cdfb0 to 0xed0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:6533 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:6533 tgid:6533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0d5d84 r8:00000002 r7:60000013 r6:ed0d5d8c r5:85a99800 r4:85a99800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a99800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a99800 r7:00000000 r6:83018200 r5:00001000 r4:7f387000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7338c r4:85a73000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7338c r4:859b8b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a99800 r8:859b8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8b00 r8:8027f5e8 r7:ed0cde60 r6:859b8b80 r5:85a99800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d5fb0 to 0xed0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f240 INFO: task kworker/1:479:6533 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: da8b4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:480:6534 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ed0e1d84 r8:00000002 r7:60000013 r6:ed0e1d8c r5:85a9a400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a7378c r4:859b8a80 r4:859b8a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 r4:8597f240 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dade1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:6538 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:6538 tgid:6538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0e9d84 r8:00000002 r7:60000113 r6:ed0e9d8c r5:85a9b000 r4:85a9b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a9b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f7c0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85a9bc00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85ab878c r4:85ab8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:859b8d80 r8:8027f5e8 r7:ed0e9e60 r6:859b8e00 r5:85a9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0fdfb0 to 0xed0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f800 INFO: task kworker/1:482:6540 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: db357000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6542 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6542 tgid:6542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed109d84 r8:00000002 r7:60000113 r6:ed109d8c r5:85a9c800 r4:85a9c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a9c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85ab838c r4:859b8e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9c800 r8:859b8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8e80 r8:8027f5e8 r7:ed0fde60 r6:859b8f00 r5:85a9c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f980 INFO: task kworker/1:483:6542 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: db5db000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597fc80 r7:ddde2d80 r6:83018200 r5:85ab8b8c r4:859b8f80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:485:6546 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:6546 tgid:6546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed111d84 r8:00000002 r7:60000013 r6:ed111d8c r5:85a9e000 r4:85a9e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a9e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d53c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f397000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed127000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab938c r4:85ab9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab938c r4:85254080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9e000 r8:852540ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254080 r8:8027f5e8 r7:ed0f5e60 r6:85254100 r5:85a9e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597fbc0 INFO: task kworker/1:485:6546 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: db5db000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:486:6548 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r4:85a9ec00 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ab8f8c r4:85ab8c00 r10:61c88647 r9:85a9ec00 r8:852541ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85254180 r8:8027f5e8 r7:ed111e60 r6:85254200 r5:85a9ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed125fb0 to 0xed125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d5d00 INFO: task kworker/1:486:6548 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dbaf8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:6549 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:6549 tgid:6549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed11dd84 r8:00000002 r7:60000013 r6:ed11dd8c r5:85a90000 r4:85a90000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a90000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed11de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f399000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab978c r4:85ab9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab978c r4:85254280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a90000 r8:852542ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254280 r8:8027f5e8 r7:ed111e60 r6:85254300 r5:85a90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed11dfb0 to 0xed11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85265080 INFO: task kworker/1:487:6549 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dbaf8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:6551 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:6551 tgid:6551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed139d84 r8:00000002 r7:60000013 r6:ed139d8c r5:85a91800 r4:85a91800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:6552 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:6552 tgid:6552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed131d84 r8:00000002 r7:60000013 r6:ed131d8c r5:85a92400 r4:85a92400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a92400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed131e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f39b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed13b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab9b8c r4:85ab9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab9b8c r4:85254480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a92400 r8:852544ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254480 r8:8027f5e8 r7:ed139e60 r6:85254500 r5:85a92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85265340 INFO: task kworker/1:489:6552 is blocked on a mutex likely owned by task kworker/0:188:3724. r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed179000 r10:61c88647 r9:85a90c00 r8:852545ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85265440 Call trace: 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:6559 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:6559 tgid:6559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed14dd84 r8:00000002 r7:60000013 r6:ed14dd8c r5:85a93c00 r4:85a93c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a93c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed155000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aba78c r4:85aba400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aba78c r4:85254680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a93c00 r8:852546ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254680 r8:8027f5e8 r7:ed145e60 r6:85254700 r5:85a93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852656c0 INFO: task kworker/1:491:6559 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dc167000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:6561 tgid:6561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed171d84 r8:00000002 r7:60000013 r6:ed171d8c r5:85a94800 r4:85a94800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a94800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed171e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f3a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed15f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abab8c r4:85aba800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abab8c r4:85254780 r10:61c88647 r9:85a94800 r8:852547ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed165000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:6564 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:6564 tgid:6564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed17dd84 r8:00000002 r7:60000013 r6:ed17dd8c r5:85a96c00 r4:85a96c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a96c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed17de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed173000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abb38c r4:85abb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abb38c r4:85254980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a96c00 r8:852549ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254980 r8:8027f5e8 r7:ed145e60 r6:85254a00 r5:85a96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed17dfb0 to 0xed17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852659c0 INFO: task kworker/1:494:6564 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dc842000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:6566 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:6566 tgid:6566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:85aa0000 r4:85aa0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85abbb8c r4:85254a80 r4:85254a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254a80 r8:8027f5e8 r7:ed145e60 r6:85254b00 r5:85aa0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852659c0 INFO: task kworker/1:495:6566 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dc842000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85254b80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:6572 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:6572 tgid:6572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1b9d84 r8:00000002 r7:60000113 r6:ed1b9d8c r5:85aa1800 r4:85aa1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524a640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abbf8c r4:85abbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abbf8c r4:85254c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa1800 r8:85254cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254c80 r8:8027f5e8 r7:ed199e60 r6:85254d00 r5:85aa1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b9fb0 to 0xed1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a4c0 INFO: task kworker/1:497:6572 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfba1000 r10:61c88647 r9:85aa3000 r8:85254dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a600 INFO: task kworker/1:498:6575 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dcfa4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:6583 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:6583 tgid:6583 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8524a880 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85254f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254f80 r8:8027f5e8 r7:ed15de60 r6:8525a000 r5:85aa4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed195fb0 to 0xed195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a880 INFO: task kworker/1:500:6584 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dd7b5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:6586 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:6586 tgid:6586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac0b8c r4:85ac0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac0b8c r4:8525a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa5400 r8:8525a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a080 r8:8027f5e8 r7:ed15de60 r6:8525a100 r5:85aa5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c5fb0 to 0xed1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a880 INFO: task kworker/1:501:6586 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dd7b5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:6608 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:6608 tgid:6608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1d5d84 r8:00000002 r7:60000113 r6:ed1d5d8c r5:85aa6c00 r4:85aa6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f92c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f339000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2df8c r4:85a2dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2df8c r4:8525a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa6c00 r8:8525a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a180 r8:8027f5e8 r7:ed1c5e60 r6:8525a200 r5:85aa6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d5fb0 to 0xed1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524af40 INFO: task kworker/1:502:6608 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ddb42000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:503:6613 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:503 state:D stack:0 pid:6613 tgid:6613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1c1d84 r8:00000002 r7:60000113 r6:ed1c1d8c r5:85aa6000 r4:85aa6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524a340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa6000 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac0f8c r4:85ac0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac0f8c r4:8525a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa6000 r8:8525a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a280 r8:8027f5e8 r7:ed1c5e60 r6:8525a300 r5:85aa6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524af00 INFO: task kworker/1:503:6613 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de005000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:6617 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:6617 tgid:6617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1ddd84 r8:00000002 r7:60000113 r6:ed1ddd8c r5:85aa0c00 r4:85aa0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac1f8c r4:85ac1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac1f8c r4:8525a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa0c00 r8:8525a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a380 r8:8027f5e8 r7:ed1c1e60 r6:8525a400 r5:85aa0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1ddfb0 to 0xed1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523fec0 INFO: task kworker/1:504:6617 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de273000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:6619 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:6619 tgid:6619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1c9d84 r8:00000002 r7:60000113 r6:ed1c9d8c r5:85a93000 r4:85a93000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a93000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591acc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a36b8c r4:85a36800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a36b8c r4:8525a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a93000 r8:8525a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a480 r8:8027f5e8 r7:ed1dde60 r6:8525a500 r5:85a93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a300 INFO: task kworker/1:505:6619 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de39f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:6664 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:6664 tgid:6664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed23dd84 r8:00000002 r7:60000113 r6:ed23dd8c r5:855b3000 r4:855b3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed23de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac1b8c r4:85ac1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac1b8c r4:8525a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:8525a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a580 r8:8027f5e8 r7:ed1dde60 r6:8525a600 r5:855b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed23dfb0 to 0xed23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a7640 INFO: task kworker/1:506:6664 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de6fc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:6678 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:6678 tgid:6678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed21dd84 r8:00000002 r7:60000113 r6:ed21dd8c r5:855b0000 r4:855b0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed21de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f3b9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac278c r4:85ac2400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac278c r4:8525a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0000 r8:8525a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a680 r8:8027f5e8 r7:ed1dde60 r6:8525a700 r5:855b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed21dfb0 to 0xed21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c83c0 INFO: task kworker/1:507:6678 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de6fc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:6680 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:6680 tgid:6680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1fdd84 r8:00000002 r7:60000113 r6:ed1fdd8c r5:855b3c00 r4:855b3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c86c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3b7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec877000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac238c r4:85ac2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac238c r4:8525a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:8525a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a780 r8:8027f5e8 r7:ed21de60 r6:8525a800 r5:855b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1fdfb0 to 0xed1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c83c0 INFO: task kworker/1:508:6680 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de97b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:6691 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:6691 tgid:6691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec855d84 r8:00000002 r7:60000113 r6:ec855d8c r5:855b4800 r4:855b4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac2b8c r4:85ac2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac2b8c r4:8525a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b4800 r8:8525a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a880 r8:8027f5e8 r7:ed21de60 r6:8525a900 r5:855b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8780 INFO: task kworker/1:509:6691 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ded98000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:6695 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:855b5400 r4:855b5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac338c r4:85ac3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac338c r4:8525a980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:8525a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a980 r8:8027f5e8 r7:ec855e60 r6:8525aa00 r5:855b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec891fb0 to 0xec891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8880 INFO: task kworker/1:510:6695 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ded98000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:6697 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:6697 tgid:6697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec881d84 r8:00000002 r7:60000113 r6:ec881d8c r5:855b6000 r4:855b6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f3e3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec947000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac378c r4:85ac3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac378c r4:8525aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6000 r8:8525aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525aa80 r8:8027f5e8 r7:ec891e60 r6:8525ab00 r5:855b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8880 INFO: task kworker/1:511:6697 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df1a4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:6716 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:6716 tgid:6716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec989d84 r8:00000002 r7:60000113 r6:ec989d8c r5:855b0c00 r4:855b0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3e5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec991000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac3b8c r4:85ac3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac3b8c r4:8525ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:8525abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ab80 r8:8027f5e8 r7:ec881e60 r6:8525ac00 r5:855b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ca780 INFO: task kworker/1:512:6716 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df467000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:6717 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec959d84 r8:00000002 r7:60000113 r6:ec959d8c r5:855b2400 r4:855b2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3538c r4:85b35000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3538c r4:8525ac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:8525acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ac80 r8:8027f5e8 r7:ec989e60 r6:8525ad00 r5:855b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ca780 INFO: task kworker/1:513:6717 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df467000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:6742 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:6742 tgid:6742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:85a95400 r4:85a95400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a95400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a95400 r7:00000000 r6:83018200 r5:00001000 r4:7f6ef000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed071000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d60b8c r4:84d60800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d60b8c r4:8525ad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a95400 r8:8525adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ad80 r8:8027f5e8 r7:ec959e60 r6:8525ae00 r5:85a95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cac80 INFO: task kworker/1:514:6742 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df467000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:6768 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:6768 tgid:6768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecdb1d84 r8:00000002 r7:60000113 r6:ecdb1d8c r5:855c3000 r4:855c3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f6ed000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d60f8c r4:84d60c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d60f8c r4:8525ae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3000 r8:8525aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ae80 r8:8027f5e8 r7:ecb21e60 r6:8525af00 r5:855c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d6540 INFO: task kworker/1:515:6768 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dfa67000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:7127 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:7127 tgid:7127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed50dd84 r8:00000002 r7:60000113 r6:ed50dd8c r5:855c2400 r4:855c2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed50de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f6f3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d6038c r4:84d60000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d6038c r4:8525af80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c2400 r8:8525afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525af80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525af80 r8:8027f5e8 r7:ecb21e60 r6:8476a000 r5:855c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed50dfb0 to 0xed50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35740 INFO: task kworker/1:516:7127 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dfd3d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:7130 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:7130 tgid:7130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed629d84 r8:00000002 r7:60000113 r6:ed629d8c r5:855c3c00 r4:855c3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed629e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6f1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d6078c r4:84d60400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d6078c r4:8476a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3c00 r8:8476a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a080 r8:8027f5e8 r7:ed50de60 r6:8476a100 r5:855c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed629fb0 to 0xed629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35a80 INFO: task kworker/1:517:7130 is blocked on a mutex, but the owner is not found. Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:7132 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:7132 tgid:7132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed62dd84 r8:00000002 r7:60000113 r6:ed62dd8c r5:855c0c00 r4:855c0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed62de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6f7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed149000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4fb8c r4:84d4f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4fb8c r4:8476a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:8476a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a180 r8:8027f5e8 r7:ed50de60 r6:8476a200 r5:855c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed62dfb0 to 0xed62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35c40 INFO: task kworker/1:518:7132 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 7f68d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 900e0013 ffffffff r5:900e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:7133 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:7133 tgid:7133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3f5d84 r8:00000002 r7:60000013 r6:ed3f5d8c r5:855c0000 r4:855c0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35e40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f6f5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed115000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4ff8c r4:84d4fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4ff8c r4:8476a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0000 r8:8476a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a280 r8:8027f5e8 r7:ed62de60 r6:8476a300 r5:855c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f5fb0 to 0xed3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35c40 INFO: task kworker/1:519:7133 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 7f68d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 900e0013 ffffffff r5:900e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:7136 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:7136 tgid:7136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed639d84 r8:00000002 r7:60000013 r6:ed639d8c r5:855c1800 r4:855c1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed639e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f6f9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4f78c r4:84d4f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4f78c r4:8476a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c1800 r8:8476a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a380 r8:8027f5e8 r7:ed62de60 r6:8476a400 r5:855c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed639fb0 to 0xed639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705100 INFO: task kworker/1:520:7136 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:7138 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:7138 tgid:7138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed641d84 r8:00000002 r7:60000013 r6:ed641d8c r5:8551ec00 r4:8551ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed641e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f6fb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed19d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad438c r4:85ad4000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad438c r4:8476a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551ec00 r8:8476a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:e04f1dc0 r5:00001000 r4:dfee5000 r4:84fab500 Exception stack(0xe04f1fb0 to 0xe04f1ff8) r4:84faa7c0 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6fd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad478c r4:85ad4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad478c r4:8476a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6c00 r8:8476a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a500 r8:8027f5e8 r7:ed641e60 r6:8476a580 r5:855c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed635fb0 to 0xed635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705100 INFO: task kworker/1:522:7140 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 7f8f8000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 900e0013 ffffffff r5:900e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:7143 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:7143 tgid:7143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed649d84 r8:00000002 r7:60000013 r6:ed649d8c r5:855c5400 r4:855c5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed649e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f6ff000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85ad4b8c r4:8476a600 r10:00000000 r9:8476a600 r8:8027f5e8 r7:ed635e60 r6:8476a680 r5:855c5400 INFO: task kworker/1:523:7143 is blocked on a mutex likely owned by task kworker/0:189:3725. 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:7144 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:7144 tgid:7144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed64dd84 r8:00000002 r7:60000113 r6:ed64dd8c r5:855c6000 r4:855c6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed64de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857055c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f701000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed423000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad4f8c r4:85ad4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad4f8c r4:8476a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6000 r8:8476a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a700 r8:8027f5e8 r7:ed649e60 r6:8476a780 r5:855c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed64dfb0 to 0xed64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705780 INFO: task kworker/1:524:7144 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad4 80239bb0 900e0013 ffffffff r4:e04f1dc0 r5:00001000 r4:dfee5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:525 state:D stack:0 pid:7147 tgid:7147 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed651e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857059c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f705000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed435000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad578c r4:85ad5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad578c r4:8476a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c4800 r8:8476a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a800 r8:8027f5e8 r7:ed64de60 r6:8476a880 r5:855c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed651fb0 to 0xed651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705600 INFO: task kworker/1:525:7147 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80188000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:7148 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:7148 tgid:7148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed63dd84 r8:00000002 r7:60000113 r6:ed63dd8c r5:855b6c00 r4:855b6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed63de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705800 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed42b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa7c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855b1800 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed655e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705e00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f70b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed44f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad638c r4:85ad6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad638c r4:8476aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:8476aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476aa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476aa00 r8:8027f5e8 r7:ed651e60 r6:8476aa80 r5:855b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed655fb0 to 0xed655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705980 INFO: task kworker/1:527:7151 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 804f2000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:7152 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:7152 tgid:7152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed659d84 r8:00000002 r7:60000013 r6:ed659d8c r5:85aa8000 r4:85aa8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed659e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa8000 r7:00000000 r6:83018200 r5:00001000 r4:7f707000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed43d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad5b8c r4:85ad5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad5b8c r4:8476ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa8000 r8:8476ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ab00 r8:8027f5e8 r7:ed655e60 r6:8476ab80 r5:85aa8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed659fb0 to 0xed659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705ac0 INFO: task kworker/1:528:7152 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 807e0000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:7154 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:7154 tgid:7154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed65dd84 r8:00000002 r7:60000013 r6:ed65dd8c r5:85aa8c00 r4:85aa8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed65de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f709000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed447000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad5f8c r4:85ad5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad5f8c r4:8476ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa8c00 r8:8476ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ac00 r8:8027f5e8 r7:ed655e60 r6:8476ac80 r5:85aa8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed65dfb0 to 0xed65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705cc0 INFO: task kworker/1:529:7154 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80b5d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:7156 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:7156 tgid:7156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed661d84 r8:00000002 r7:60000113 r6:ed661d8c r5:85aa9800 r4:85aa9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed661e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705f80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f70d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed459000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad678c r4:85ad6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad678c r4:8476ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa9800 r8:8476ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ad00 r8:8027f5e8 r7:ed655e60 r6:8476ad80 r5:85aa9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed661fb0 to 0xed661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705d80 INFO: task kworker/1:530:7156 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80b5d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:84faa7c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85aaa400 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed665e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f70f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed465000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad6b8c r4:85ad6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad6b8c r4:8476ae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaa400 r8:8476ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ae00 r8:8027f5e8 r7:ed661e60 r6:8476ae80 r5:85aaa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed665fb0 to 0xed665ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:83afefc0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac11e4 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fab500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:532 state:D stack:0 pid:7161 tgid:7161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed669d84 r8:00000002 r7:60000113 r6:ed669d8c r5:85aab000 r4:85aab000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aab000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed669e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aab000 r7:00000000 r6:83018200 r5:00001000 r4:7f717000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad7b8c r4:85ad7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad7b8c r4:8476af00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aab000 r8:8476af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476af00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476af00 r8:8027f5e8 r7:ed665e60 r6:8476af80 r5:85aab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed669fb0 to 0xed669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf280 INFO: task kworker/1:532:7161 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80ec8000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:7163 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:7163 tgid:7163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed679d84 r8:00000002 r7:60000113 r6:ed679d8c r5:8551c800 r5:8551c800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed477000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85bc9000 r8:8027f5e8 r7:ed669e60 r6:859b4100 r5:8551c800 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81102000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:7164 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:7164 tgid:7164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed67dd84 r8:00000002 r7:60000113 r6:ed67dd8c r5:8551e000 r4:8551e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed67de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551e000 r7:00000000 r6:83018200 r5:00001000 r4:7f713000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed483000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad738c r4:85ad7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad738c r4:85bc9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551e000 r8:85bc90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9080 r8:8027f5e8 r7:ed669e60 r6:859b4180 r5:8551e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed67dfb0 to 0xed67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf2c0 INFO: task kworker/1:534:7164 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa7c0 Not tainted 6.15.0-syzkaller #0 task:kworker/1:535 state:D stack:0 pid:7166 tgid:7166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed681d84 r8:00000002 r7:60000013 r6:ed681d8c r5:8551b000 r4:8551b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed681e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551b000 r7:00000000 r6:83018200 r5:00001000 r4:7f715000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed495000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad778c r4:85ad7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad778c r4:85bc9100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551b000 r8:85bc912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9100 r8:8027f5e8 r7:ed669e60 r6:859b4200 r5:8551b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed681fb0 to 0xed681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf3c0 INFO: task kworker/1:535:7166 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 813e1000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:7168 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:7168 tgid:7168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed689d84 r8:00000002 r7:60000113 r6:ed689d8c r5:83243c00 r4:83243c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83243c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed689e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f71b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed697000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adc38c r4:85adc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc38c r4:85bc9180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83243c00 r8:85bc91ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9180 r8:8027f5e8 r7:ed669e60 r6:859b4280 r5:83243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed689fb0 to 0xed689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf540 INFO: task kworker/1:536:7168 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81a5a000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:7169 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:7169 tgid:7169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed68dd84 r8:00000002 r7:60000113 r6:ed68dd8c r5:85404800 r4:85404800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85404800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed68de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f719000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad7f8c r4:85ad7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad7f8c r4:85bc9200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85404800 r8:85bc922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9200 r8:8027f5e8 r7:ed689e60 r6:859b4300 r5:85404800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed68dfb0 to 0xed68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf540 INFO: task kworker/1:537:7169 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81a5a000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:7171 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:7171 tgid:7171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed695d84 r8:00000002 r7:60000013 r6:ed695d8c r5:84d78c00 r4:84d78c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d78c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed695e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfa00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f603000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adc78c r4:85adc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc78c r4:85bc9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d78c00 r8:85bc92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9280 r8:8027f5e8 r7:ed689e60 r6:859b4380 r5:84d78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed695fb0 to 0xed695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf700 INFO: task kworker/1:538:7171 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81b10000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:7174 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:7174 tgid:7174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed5d9d84 r8:00000002 r7:60000113 r6:ed5d9d8c r5:84d79800 r4:84d79800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d79800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d79800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adcb8c r4:85adc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcb8c r4:85bc9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d79800 r8:85bc932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9300 r8:8027f5e8 r7:ed695e60 r6:859b4400 r5:84d79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5d9fb0 to 0xed5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf9c0 INFO: task kworker/1:539:7174 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81f24000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:7176 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:7176 tgid:7176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed5ddd84 r8:00000002 r7:60000013 r6:ed5ddd8c r5:84d7a400 r4:84d7a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfc00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adcf8c r4:85adcc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcf8c r4:85bc9380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d7a400 r8:85bc93ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9380 r8:8027f5e8 r7:ed5d9e60 r6:859b4480 r5:84d7a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5ddfb0 to 0xed5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfb00 INFO: task kworker/1:540:7176 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 82155000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:7178 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:7178 tgid:7178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6a1d84 r8:00000002 r7:60000013 r6:ed6a1d8c r5:84d7b000 r4:84d7b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6a1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfd40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f6cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85add38c r4:85add000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add38c r4:85bc9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d7b000 r8:85bc942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9400 r8:8027f5e8 r7:ed5dde60 r6:859b4500 r5:84d7b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6a1fb0 to 0xed6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfb40 INFO: task kworker/1:541:7178 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 8242a000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:7180 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:7180 tgid:7180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6a5d84 r8:00000002 r7:60000113 r6:ed6a5d8c r5:84d7bc00 r4:84d7bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85addf8c r4:85bc9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d7bc00 r8:85bc94ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9480 r8:8027f5e8 r7:ed6a1e60 r6:859b4580 r5:84d7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6a5fb0 to 0xed6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfd80 INFO: task kworker/1:542:7180 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 828a3000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:7181 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:7181 tgid:7181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed675d84 r8:00000002 r7:60000013 r6:ed675d8c r5:85aae000 r4:85aae000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aae000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfe80 r9:83018205 r8:85aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f6d1000 r5:00001000 r4:ed4c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add78c r4:85bc9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aae000 r8:85bc952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9500 r8:8027f5e8 r7:ed6a5e60 r6:85bc9580 r5:85aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfec0 INFO: task kworker/1:543:7181 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 828a3000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:544:7183 blocked for more than 478 seconds. r4:85aac800 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85bc9600 Exception stack(0xed691fb0 to 0xed691ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:7187 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:7187 tgid:7187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6a9d84 r8:00000002 r7:60000013 r6:ed6a9d8c r5:85aaec00 r4:85aaec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aaec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aaec00 r7:00000000 r6:83018200 r5:00001000 r4:7f723000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ade38c r4:85ade000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade38c r4:85bc9700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaec00 r8:85bc972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed6a9fb0 to 0xed6a9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:7189 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:7189 tgid:7189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed66dd84 r8:00000002 r7:60000013 r6:ed66dd8c r5:85aad400 r4:85aad400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aad400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aad400 r7:00000000 r6:83018200 r5:00001000 r4:7f725000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ade78c r4:85ade400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade78c r4:85bc9800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aad400 r8:85bc982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9800 r8:8027f5e8 r7:ed6a9e60 r6:85bc9880 r5:85aad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed66dfb0 to 0xed66dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:7191 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:7191 tgid:7191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6add84 r8:00000002 r7:60000013 r6:ed6add8c r5:85aabc00 r4:85aabc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aabc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aabc00 r7:00000000 r6:83018200 r5:00001000 r4:7f729000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed51f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adef8c r4:85adec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adef8c r4:85bc9900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aabc00 r8:85bc992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9900 r8:8027f5e8 r7:ed66de60 r6:85bc9980 r5:85aabc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6adfb0 to 0xed6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bbf500 INFO: task kworker/1:547:7191 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 82fd2000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:7193 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:7193 tgid:7193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6b1d84 r8:00000002 r7:60000113 r6:ed6b1d8c r5:84690000 r4:84690000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84690000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84690000 r7:00000000 r6:83018200 r5:00001000 r4:7f727000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed517000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adeb8c r4:85ade800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adeb8c r4:85bc9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84690000 r8:85bc9a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9a00 r8:8027f5e8 r7:ed6ade60 r6:85bc9a80 r5:84690000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b1fb0 to 0xed6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:7195 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:7195 tgid:7195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6b5d84 r8:00000002 r7:60000113 r6:ed6b5d8c r5:84690c00 r4:84690c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84690c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbfb80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84690c00 r7:00000000 r6:83018200 r5:00001000 r4:7f72d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed531000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adf78c r4:85adf400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adf78c r4:85bc9b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84690c00 r8:85bc9b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9b00 r8:8027f5e8 r7:ed6ade60 r6:85bc9b80 r5:84690c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b5fb0 to 0xed6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85bbf880 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:550 state:D stack:0 pid:7197 tgid:7197 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed529000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed6b9fb0 to 0xed6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bbf9c0 INFO: task kworker/1:550:7197 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 835be000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:7199 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:7199 tgid:7199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6bdd84 r8:00000002 r7:60000013 r6:ed6bdd8c r5:84692400 r4:84692400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84692400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6bde08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed53b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85bc9d00 r8:8027f5e8 r7:ed6b5e60 r6:85bc9d80 r5:84692400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad4 80239bb0 800e0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:7201 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:7201 tgid:7201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6c1d84 r8:00000002 r7:60000113 r6:ed6c1d8c r5:84693000 r4:84693000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84693000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84693000 r7:00000000 r6:83018200 r5:00001000 r4:7f735000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed555000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae878c r4:85ae8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae878c r4:85bc9e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84693000 r8:85bc9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9e00 r8:8027f5e8 r7:ed6bde60 r6:85bc9e80 r5:84693000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c1fb0 to 0xed6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bbfd00 INFO: task kworker/1:552:7201 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 83b44000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:84693c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbfec0 r5:00001000 r4:ed543000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85adff8c r4:85bc9f00 r4:85bc9f00 Exception stack(0xed6c5fb0 to 0xed6c5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad4 80239bb0 800e0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:554 state:D stack:0 pid:7206 tgid:7206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6c9d84 r8:00000002 r7:60000013 r6:ed6c9d8c r5:84694800 r4:84694800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84694800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84694800 r7:00000000 r6:83018200 r5:00001000 r4:7f73b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed571000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae938c r4:85ae9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae938c r4:85bb5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84694800 r8:85bb502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5000 r8:8027f5e8 r7:ed6c1e60 r6:85bb5080 r5:84694800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c9fb0 to 0xed6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb20c0 INFO: task kworker/1:554:7206 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 83ee7000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:555 state:D stack:0 pid:7208 tgid:7208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6cdd84 r8:00000002 r7:60000013 r6:ed6cdd8c r5:84695400 r4:84695400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84695400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb21c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84695400 r7:00000000 r6:83018200 r5:00001000 r4:7f737000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed55f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae8b8c r4:85ae8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae8b8c r4:85bb5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84695400 r8:85bb512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5100 r8:8027f5e8 r7:ed6c9e60 r6:85bb5180 r5:84695400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6cdfb0 to 0xed6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2180 INFO: task kworker/1:555:7208 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 841c4000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:7210 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:7210 tgid:7210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6d5d84 r8:00000002 r7:60000013 r6:ed6d5d8c r5:84696000 r4:84696000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84696000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84696000 r7:00000000 r6:83018200 r5:00001000 r4:7f739000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed567000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae8f8c r4:85ae8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae8f8c r4:85bb5200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84696000 r8:85bb522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5200 r8:8027f5e8 r7:ed6c9e60 r6:85bb5280 r5:84696000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d5fb0 to 0xed6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb22c0 INFO: task kworker/1:556:7210 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 84337000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:7212 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:7212 tgid:7212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6d1d84 r8:00000002 r7:60000013 r6:ed6d1d8c r5:85c10000 r4:85c10000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c10000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2600 r5:00001000 r4:ed579000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85c10000 r8:85bb532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb2680 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:7214 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:7214 tgid:7214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed585d84 r8:00000002 r7:60000013 r6:ed585d8c r5:85c10c00 r4:85c10c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c10c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed585e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb28c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f73f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed589000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae9b8c r4:85ae9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed585fb0 to 0xed585ff8) task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:559:7216 blocked for more than 479 seconds. task:kworker/1:559 state:D stack:0 pid:7216 tgid:7216 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85c12400 r5:85c12400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2c40 r5:00001000 r4:ed59b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aea38c r4:85bb5500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c12400 r8:85bb552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5500 r8:8027f5e8 r7:ed585e60 r6:85bb5580 r5:85c12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6ddfb0 to 0xed6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb23c0 INFO: task kworker/1:559:7216 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 84803000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:7219 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:7219 tgid:7219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6e1d84 r8:00000002 r7:60000113 r6:ed6e1d8c r5:85c14800 r4:85c14800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c14800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c14800 r7:00000000 r6:83018200 r5:00001000 r4:7f741000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed591000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae9f8c r4:85ae9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae9f8c r4:85bb5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c14800 r8:85bb562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5600 r8:8027f5e8 r7:ed6dde60 r6:85bb5680 r5:85c14800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2980 INFO: task kworker/1:560:7219 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 84bc7000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 Not tainted 6.15.0-syzkaller #0 r5:85c13000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed5a3000 r5:85aea78c r4:85aea400 r10:61c88647 r9:85c13000 r8:85bb572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:7222 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:7222 tgid:7222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6d9d84 r8:00000002 r7:60000113 r6:ed6d9d8c r5:85c11800 r4:85c11800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c11800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba5940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c11800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed41f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aebb8c r4:85aeb800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aebb8c r4:85bb5800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c11800 r8:85bb582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5800 r8:8027f5e8 r7:ed6e5e60 r6:85bb5880 r5:85c11800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d9fb0 to 0xed6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2ec0 INFO: task kworker/1:562:7222 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa7c0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ede08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2f00 INFO: task kworker/1:563:7224 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 855c7000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:7230 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85c16c00 r4:00000000 r9:83018205 r8:85c16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f74b000 r5:00001000 r4:ed5bf000 r5:85aeb38c r4:85aeb000 r4:85bb5a00 Exception stack(0xed5f1fb0 to 0xed5f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ed621d84 r8:00000002 r7:60000113 r6:ed621d8c r5:85c13c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba54c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aebf8c r4:85aebc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aebf8c r4:85bb5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c13c00 r8:85bb5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5b00 r8:8027f5e8 r7:ed6d9e60 r6:85bb5b80 r5:85c13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed621fb0 to 0xed621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ba5ac0 INFO: task kworker/1:565:7257 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 85a44000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:7259 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:7259 tgid:7259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed69dd84 r8:00000002 r7:60000013 r6:ed69dd8c r5:85c15400 r4:85c15400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c15400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed69de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc03c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c15400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d61f8c r4:84d61c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d61f8c r4:85bb5c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c15400 r8:85bb5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5c00 r8:8027f5e8 r7:ed621e60 r6:85bb5c80 r5:85c15400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed69dfb0 to 0xed69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ba5780 INFO: task kworker/1:566:7259 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 85a44000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:7261 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:7261 tgid:7261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6f5d84 r8:00000002 r7:60000113 r6:ed6f5d8c r5:84696c00 r4:84696c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84696c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84696c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84696c00 r8:85bb5d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb2f00 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:568:7263 blocked for more than 479 seconds. r4:85c20000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f1e08 r5:00001000 r4:ed4f3000 r5:857c478c r4:857c4400 r10:61c88647 r9:85c20000 r8:85bb5e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed6f1fb0 to 0xed6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ba51c0 INFO: task kworker/1:568:7263 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86069000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:7266 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:7266 tgid:7266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed535000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85c20c00 r8:85bb5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:570:7268 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r4:85c21800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed507000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857c4b8c r4:857c4800 r7:ddde2d80 r6:83018200 r5:857c4b8c r4:85bc8000 r10:61c88647 r9:85c21800 r8:85bc802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8000 r8:8027f5e8 r7:ed6f9e60 r6:85bc8080 r5:85c21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed705fb0 to 0xed705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2140 INFO: task kworker/1:570:7268 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86428000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:7269 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:7269 tgid:7269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6fdd84 r8:00000002 r7:60000113 r6:ed6fdd8c r5:85c22400 r4:85c22400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c22400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c22400 r7:00000000 r6:83018200 r5:00001000 r4:7f709000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed519000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c4f8c r4:857c4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c4f8c r4:85bc8100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c22400 r8:85bc812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8100 r8:8027f5e8 r7:ed6f9e60 r6:85bc8180 r5:85c22400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6fdfb0 to 0xed6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2140 INFO: task kworker/1:571:7269 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86428000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:7271 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:7271 tgid:7271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed709d84 r8:00000002 r7:60000113 r6:ed709d8c r5:85c23000 r4:85c23000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed709e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c23000 r7:00000000 r6:83018200 r5:00001000 r4:7f70b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed525000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c538c r4:857c5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c538c r4:85bc8200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23000 r8:85bc822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8200 r8:8027f5e8 r7:ed6f9e60 r6:85bc8280 r5:85c23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed709fb0 to 0xed709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc24c0 INFO: task kworker/1:572:7271 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 868fc000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:7274 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:7274 tgid:7274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed70dd84 r8:00000002 r7:60000113 r6:ed70dd8c r5:85c23c00 r4:85c23c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed70de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f711000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed54f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c5f8c r4:857c5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c5f8c r4:85bc8300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23c00 r8:85bc832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8300 r8:8027f5e8 r7:ed6f9e60 r6:85bc8380 r5:85c23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed70dfb0 to 0xed70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2600 INFO: task kworker/1:573:7274 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86c3d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:7275 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:7275 tgid:7275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed711d84 r8:00000002 r7:60000013 r6:ed711d8c r5:85c24800 r4:85c24800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c24800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed711e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c24800 r7:00000000 r6:83018200 r5:00001000 r4:7f70f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed541000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c5b8c r4:857c5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c5b8c r4:85bc8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c24800 r8:85bc842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8400 r8:8027f5e8 r7:ed70de60 r6:85bc8480 r5:85c24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed711fb0 to 0xed711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2740 INFO: task kworker/1:574:7275 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86efc000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d60: 80230ad4 80239bb0 800e0013 ffffffff r4:82ac11e4 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500